Characterizations and Boundaries of Security Requirements Patterns
Title | Characterizations and Boundaries of Security Requirements Patterns |
Publication Type | Conference Proceedings |
Year of Publication | 2012 |
Authors | Slavin, Rocky, Shen, Hui, Niu, Jianwei |
Conference Name | IEEE 2nd Workshop on Requirements Engineering Patterns (RePa’12) |
Publisher | IEEE |
Conference Location | Chicago, IL |
Keywords | patterns security security requirements |
Abstract | Very often in the software development life cycle, security is applied too late or important security aspects are overlooked. Although the use of security patterns is gaining popularity, the current state of security requirements patterns is such that there is not much in terms of a defining structure. To address this issue, we are working towards defining the important characteristics as well as the boundaries for security requirements patterns in order to make them more effective. By examining an existing general pattern format that describes how security patterns should be structured and comparing it to existing security requirements patterns, we are deriving characterizations and boundaries for security requirements patterns. From these attributes, we propose a defining format. We hope that these can reduce user effort in elicitation and specification of security requirements patterns. |
DOI | 10.1109/RePa.2012.6359974 |
Citation Key | node-17167 |