Skip to main content

Difficult on Addressing Security: A Security Requirement Framework

  • Conference paper
  • First Online:
International Conference on Intelligent and Smart Computing in Data Analytics

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1312))

  • 265 Accesses

Abstract

For any security updation, software must be secure that can be analyzed at the early stage of requirements. All security analysis is prejudiced approach which follows certain rules, defined-laws. Models and policies made the software worthwhile. However, in today scenario, still there is a deficiency in security requirements. It has been observed that to capture security requirement a business goals must be fulfilled that helps to protect assets from threats. This is the reality that any security violation is caused openly by vulnerable software. A scrupulous review has carried out regarding the fact as there are many approaches that consists of policy, rules or any guidelines for secure requirement phase. Therefore, it is desirable to develop a prescriptive framework that addresses security at requirement phase. The chronological approach of security requirement framework is presented that helps security experts to analyze security and mitigate threat at requirement phase.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Common Criteria Board (2009) Common criteria for information technology security evaluation, version 3.1

    Google Scholar 

  2. Sullivan Richard J (2014) Controlling security risk and fraud in payment systems. Federal Reserve Bank of Kansas City Econ Rev 99(3):47–78

    Google Scholar 

  3. McGraw G (2003) In: Software security: thought leadership in information security. Cigital Software Security Workshop

    Google Scholar 

  4. Taylor D, McGraw G (2005) In: Adopting a software security improvement program. IEEE Security and Privacy, pp 88–91

    Google Scholar 

  5. McGraw G, Mead N (2005) A portal for software security. IEEE Secur Privacy 3:75–79

    Google Scholar 

  6. Haley CB, Laney R, Moffett JD, Nuseibeh B (2008) Security requirements engineering: a framework for representation and analysis. IEEE Trans Softw Eng 34(1):133–152

    Article  Google Scholar 

  7. Graham D (2006) Introduction to the CLASP process. Build Security

    Google Scholar 

  8. Ki-Aries D (2018) Assessing security risk and requirements for systems of systems. In: 2018 IEEE 26th International requirements engineering conference, IEEE. https://doi.org/10.1109/re.2018.00061

  9. Lipner S, Howard M (2005) The trustworthy computing security development life cycle. Microsoft Corp

    Google Scholar 

  10. Torr P (2005) Demystifying the threat modeling process. IEEE Secur Privacy 3(5):66–70

    Article  Google Scholar 

  11. Mellado D, Fernandez-Medina E, Piattini M (2007) A Common criteria based security requirements engineering process for the development of secure information systems. Comput Stand Interf 29(2):244–253

    Article  Google Scholar 

  12. Humphrey WS (2002) In: Winning with software: an executive strategy. Boston, MA, Addison Wesley (ISBN 0201776391)

    Google Scholar 

  13. Sodiya AS, Onashoga SA, Ajayi OB (2006) Towards building secure software systems. In: Proceedings of issues in informing science and information technology, June 25–28, vol 3. Salford, Greater Manchester, England

    Google Scholar 

  14. Flechais I, Mascolo C, Angela Sasse M (2006) Integrating security and usability into the requirements and design process. In: Proceedings of the second international conference on global E-security, London, UK. http://www.softeng.ox.ac.uk/personal/Ivan.Flechais/downloads/icges.pdf

  15. Reza M, Shirazi A, Jaferian P, Elahi G, Baghi H, Sadeghian B (2005) RUPSec: an extension on rup for developing secure systems-requirements discipline. In: Proceedings of World academy of science, engineering and technology, vol 4. pp 208–212. ISSN 1307–6884

    Google Scholar 

  16. Software Security Assurance (2007) State-of-the- Art Report (SOAR) Information Assurance Technology Analysis Center (IATAC) Data and Analysis Center for Software (DACS) Joint endeavor by IATAC with DACS

    Google Scholar 

  17. Oracle Software Security Assurance [web page] (Redwood Shores, CA, Oracle Corporation)

    Google Scholar 

  18. Mellado D, Fernández-Medina E, Piattini M (2006) Applying a security requirements engineering process. In: European symposium on research in computer security, Springer, Berlin, Heidelberg, Germany, pp 192–206

    Google Scholar 

  19. Ki-Aries D, Faily S, Dogan H,  Williams C (2018) Assessing system of systems security risk and requirements with OASoSIS. In: 2018 IEEE 5th international workshop on evolving security and privacy requirements engineering (ESPRE), IEEE, pp 14–20

    Google Scholar 

  20. Guerra PADC, Rubira C, de Lemos R (2003) In: A fault-tolerant software architecture for component-based systems. Lecture Notes in Computer Science. vol 2677. Springer, pp 129–149

    Google Scholar 

  21. Fernandez EB (2004) A methodology for secure software design. In: Proc of the int’l symp web services and applications (ISWS). www.cse.fau.edu/_ed/EFLVSecSysDes1.pdf

  22. Kurtanovi´c Z, Maalej W (2017) Automatically classifying functional and non-functional requirements using supervised machine learning. In: Proceedings the 25th IEEE international requirements engineering conference, Lisbon, Portugal, Sep. 2017, pp 490–495

    Google Scholar 

  23. Parveen N, Beg R, Khan MH (2014) Integrating security and usability at requirement specification process. Int J Comput Trends Technol (IJCTT) 10: 236–240

    Google Scholar 

  24. Mohammed NM, Niazi M, Alshayeb M, Mahmood S (2017) Exploring software security approaches in software development lifecycle: a systematic mapping study. Comput Standards Interfaces 50(1):107–115

    Article  Google Scholar 

  25. Kyriazanos DM, Thanos KG, Thomopoulos SCA (2019) Automated decision making in airport checkpoints: bias detection toward smarter security and fairness, IEEE

    Google Scholar 

  26. Parveen N, Beg MR et al (2014) Software security issues: requirement perspectives. Int J Sci Eng Res 5(7):11–15. ISSN 2229–5518

    Google Scholar 

  27. Parveen N, Beg MR, Khan MH (2014) Bridging the gap between requirement and security through secure requirement specification checklist. In: Proceedings of 16 th IRF international conference, 14 th December 2014, Pune, India, pp 6–10. ISBN: 978–93-84209-74-2

    Google Scholar 

  28. Parveen N, Beg MR, Khan MH (2015) Model to quantify confidentiality at requirement phase. In: Proceedings of the 2015 international conference on advanced research in computer science engineering and technology(ACM ICARCSET-2015) 6–7th March 2015. ISBN: 978–1–4503-3441-9

    Google Scholar 

  29. Nikhat P, Beg MR, Khan MH (2015) Model to quantify availability at requirement phase of secure software. Amer J Softw Eng Appl 4(5):86–91

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nikhat Parveen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Parveen, N., Khaliq, M. (2021). Difficult on Addressing Security: A Security Requirement Framework. In: Bhattacharyya, S., Nayak, J., Prakash, K.B., Naik, B., Abraham, A. (eds) International Conference on Intelligent and Smart Computing in Data Analytics. Advances in Intelligent Systems and Computing, vol 1312. Springer, Singapore. https://doi.org/10.1007/978-981-33-6176-8_18

Download citation

Publish with us

Policies and ethics