Reference Hub26
Model Based Process to Support Security and Privacy Requirements Engineering

Model Based Process to Support Security and Privacy Requirements Engineering

Shareeful Islam, Haralambos Mouratidis, Christos Kalloniatis, Aleksandar Hudic, Lorenz Zechner
Copyright: © 2012 |Volume: 3 |Issue: 3 |Pages: 22
ISSN: 1947-3036|EISSN: 1947-3044|EISBN13: 9781466613997|DOI: 10.4018/jsse.2012070101
Cite Article Cite Article

MLA

Islam, Shareeful, et al. "Model Based Process to Support Security and Privacy Requirements Engineering." IJSSE vol.3, no.3 2012: pp.1-22. http://doi.org/10.4018/jsse.2012070101

APA

Islam, S., Mouratidis, H., Kalloniatis, C., Hudic, A., & Zechner, L. (2012). Model Based Process to Support Security and Privacy Requirements Engineering. International Journal of Secure Software Engineering (IJSSE), 3(3), 1-22. http://doi.org/10.4018/jsse.2012070101

Chicago

Islam, Shareeful, et al. "Model Based Process to Support Security and Privacy Requirements Engineering," International Journal of Secure Software Engineering (IJSSE) 3, no.3: 1-22. http://doi.org/10.4018/jsse.2012070101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Software systems are becoming more complex, interconnected and liable to adopt continuous change and evolution. It’s necessary to develop appropriate methods and techniques to ensure security and privacy of such systems. Research efforts that aim to ensure security and privacy of software systems are distinguished through two main categories: (1) the development of requirements engineering methods, and (2) implementation techniques. Approaches that fall in the first category usually aim to address either security or privacy in an implicit way, with emphasis on the security aspects by developing methods to elicit and analyse security (and privacy) requirements. Works that fall in the latter categories focus specifically on the later stages of the development process irrespective of the organisational context in which the system will be incorporated. This work introduces a model-based process for security and privacy requirements engineering. In particular, the authors’ work includes activities which support to identify and analyse security and privacy requirements for the software system. Their purpose process combines concepts from two well-known requirements engineering methods, Secure Tropos and PriS. A real case study from the EU project E-vote, i.e., an Internet based voting system, is employed to demonstrate the applicability of the approach.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.