Reference Hub4
A Tagging Approach to Extract Security Requirements in Non-Traditional Software Development Processes

A Tagging Approach to Extract Security Requirements in Non-Traditional Software Development Processes

Annette Tetmeyer, Daniel Hein, Hossein Saiedian
Copyright: © 2014 |Volume: 5 |Issue: 4 |Pages: 17
ISSN: 1947-3036|EISSN: 1947-3044|EISBN13: 9781466656871|DOI: 10.4018/ijsse.2014100102
Cite Article Cite Article

MLA

Tetmeyer, Annette, et al. "A Tagging Approach to Extract Security Requirements in Non-Traditional Software Development Processes." IJSSE vol.5, no.4 2014: pp.31-47. http://doi.org/10.4018/ijsse.2014100102

APA

Tetmeyer, A., Hein, D., & Saiedian, H. (2014). A Tagging Approach to Extract Security Requirements in Non-Traditional Software Development Processes. International Journal of Secure Software Engineering (IJSSE), 5(4), 31-47. http://doi.org/10.4018/ijsse.2014100102

Chicago

Tetmeyer, Annette, Daniel Hein, and Hossein Saiedian. "A Tagging Approach to Extract Security Requirements in Non-Traditional Software Development Processes," International Journal of Secure Software Engineering (IJSSE) 5, no.4: 31-47. http://doi.org/10.4018/ijsse.2014100102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

While software security has become an expectation, stakeholders often have difficulty expressing such expectations. Elaborate (and expensive) frameworks to identify, analyze, validate and incorporate security requirements for large software systems (and organizations) have been proposed, however, small organizations working within short development lifecycles and minimal resources cannot justify such frameworks and often need a light and practical approach to security requirements engineering that can be easily integrated into their existing development processes. This work presents an approach for eliciting, analyzing, prioritizing and developing security requirements which can be integrated into existing software development lifecycles for small organizations. The approach is based on identifying candidate security goals using part of speech (POS) tagging, categorizing security goals based on canonical security definitions, and understanding the stakeholder goals to develop preliminary security requirements and to prioritize them. It uses a case study to validate the feasibility and effectiveness of the proposed approach.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.