DocumentCode
2320337
Title
Characterizations and boundaries of security requirements patterns
Author
Slavin, Rocky ; Shen, Hui ; Niu, Jianwei
Author_Institution
Dept. of Comput. Sci., Univ. of Texas at San Antonio, San Antonio, TX, USA
fYear
2012
fDate
24-24 Sept. 2012
Firstpage
48
Lastpage
53
Abstract
Very often in the software development life cycle, security is applied too late or important security aspects are overlooked. Although the use of security patterns is gaining popularity, the current state of security requirements patterns is such that there is not much in terms of a defining structure. To address this issue, we are working towards defining the important characteristics as well as the boundaries for security requirements patterns in order to make them more effective. By examining an existing general pattern format that describes how security patterns should be structured and comparing it to existing security requirements patterns, we are deriving characterizations and boundaries for security requirements patterns. From these attributes, we propose a defining format. We hope that these can reduce user effort in elicitation and specification of security requirements patterns.
Keywords
security of data; software engineering; boundaries; characterizations; defining format; security aspects; security requirements patterns; software development life cycle; Context; Guidelines; Security; Silicon; Software systems; Unified modeling language; patterns; security; security requirements;
fLanguage
English
Publisher
ieee
Conference_Titel
Requirements Patterns (RePa), 2012 IEEE Second International Workshop on
Conference_Location
Chicago, IL
Print_ISBN
978-1-4673-4374-9
Electronic_ISBN
978-1-4673-4375-6
Type
conf
DOI
10.1109/RePa.2012.6359974
Filename
6359974
Link To Document