A comparison of security requirements engineering methods

  • Authors:
  • Benjamin Fabian;Seda Gürses;Maritta Heisel;Thomas Santen;Holger Schmidt

  • Affiliations:
  • Humboldt-Universität zu Berlin, Institute of Information Systems, Berlin, Germany;ESAT/COSIC, K.U. Leuven, Leuven-Heverlee, Belgium;University of Duisburg-Essen, Software Engineering, Duisburg, Germany;European Microsoft Innovation Center, Aachen, Germany;University of Duisburg-Essen, Software Engineering, Duisburg, Germany

  • Venue:
  • Requirements Engineering - Special Issue on RE'09: Security Requirements Engineering; Guest Editors: Eric Dubois and Haralambos Mouratidis
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents a conceptual framework for security engineering, with a strong focus on security requirements elicitation and analysis. This conceptual framework establishes a clear-cut vocabulary and makes explicit the interrelations between the different concepts and notions used in security engineering. Further, we apply our conceptual framework to compare and evaluate current security requirements engineering approaches, such as the Common Criteria, Secure Tropos, SREP, MSRA, as well as methods based on UML and problem frames. We review these methods and assess them according to different criteria, such as the general approach and scope of the method, its validation, and quality assurance capabilities. Finally, we discuss how these methods are related to the conceptual framework and to one another.