Title | ||
---|---|---|
Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach |
Abstract | ||
---|---|---|
Since many decades, requirements engineering domain has seen significant enhancements towards adapting the security and risk analysis concepts. In this regard, there exist numerous security requirements engineering methodologies that support elicitation and evaluation of the security requirements. However, selecting a security requirements engineering methodology (SRE) for a given context of use often depends on a set of ad hoc criteria. In this paper, we propose a methodological evaluation methodology that helps in identifying the characteristics of a good SRE methodology. |
Year | DOI | Venue |
---|---|---|
2017 | 10.1145/3098954.3098996 | ARES |
Keywords | Field | DocType |
Security requirements engineering, evaluation methodology | Computer science,Computer security,Security engineering,Requirements engineering,Requirements analysis,Risk analysis (engineering),Requirements elicitation,Requirements management,Requirement,Goal modeling,Non-functional requirement | Conference |
ISBN | Citations | PageRank |
978-1-4503-5257-4 | 1 | 0.43 |
References | Authors | |
9 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Sravani Teja Bulusu | 1 | 1 | 1.45 |
Romain Laborde | 2 | 162 | 28.88 |
Ahmad Samer Wazan | 3 | 22 | 7.96 |
francois barrere | 4 | 55 | 14.34 |
Abdelmalek Benzekri | 5 | 77 | 21.73 |