Abstract
Over the past two decades, there has been a significant emphasis on the research work towards the amelioration within the discipline of security requirements engineering. Many researchers, international standards and organizations have come up with various methodologies to facilitate the elicitation and evaluation of security requirements. However, the task of deriving good quality requirements still remains challenging. One of the main reasons is that there is no consensus in defining what is a good and a bad requirement. The purpose of this paper is to provide with a survey of various quality characteristics of requirements proposed by various authors from different perspectives. Our survey analysis shows that there are a total of 20 distinctive characteristics that are defined in order to evaluate the quality aspects of requirements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
ISO, I., IEC, IEEE: ISO/IEC/IEEE 29148:2011 Systems and software engineering – Life cycle processes – Requirements engineering. International Organization for Standardization (2011)
Pohl, K.: Requirements Engineering: Fundamentals, Principles, and Techniques. Springer Publishing Company, Incorporated (2010)
Wieringa, R., Maiden, N., Mead, N., Rolland, C.: Requirements engineering paper classification and evaluation criteria: a proposal and a discussion. Requirements Eng. 11, 102–107 (2006)
Van Lamsweerde, A.: Requirements engineering: from system goals to UML models to software specifications (2009)
Mouratidis, H., Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. 17, 285–309 (2007)
Hatebur, D., Heisel, M., Schmidt, H.: A pattern system for security requirements engineering. In: The Second International Conference on Availability, Reliability and Security, 2007, ARES 2007, pp. 356–365. IEEE (2007)
Graa, M., Cuppens-Boulahia, N., Autrel, F., Azkia, H., Cuppens, F., Coatrieux, G., Cavalli, A., Mammar, A.: Using requirements engineering in an automatic security policy derivation process. In: Data Privacy Management and Autonomous Spontaneous Security, pp. 155–172. Springer, Heidelberg (2012)
Firesmith, D.: Specifying good requirements. J. Object Technol. 2, 77–87 (2003)
Mills, H.D.: Software Engineering Economics by Barry W. Boehm (1982). Comments on
Walia, G.S., Carver, J.C.: A systematic literature review to identify and classify software requirement errors. Inf. Softw. Technol. 51, 1087–1109 (2009)
Sommerville, I., Sawyer, P.: Requirements Engineering: A Good Practice Guide. Wiley, Hoboken (1997)
Young, R.R.: The Requirements Engineering Handbook. Artech House (2004)
Hull, E., Jackson, K., Dick, J.: Requirements Engineering. Springer Science & Business Media (2010)
Wiegers, K.E.: Writing quality requirements. Softw. Develop. 7, 44–48 (1999)
Egyed, A., Grunbacher, P.: Identifying requirements conflicts and cooperation: how quality attributes and automated traceability can help. IEEE Softw. 21, 50–58 (2004)
Ciechanowicz, Z.: Risk analysis: requirements, conflicts and problems. Comput. Secur. 16, 223–232 (1997)
Massacci, F., Zannone, N.: Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank. MIT Press, Cambridge (2008). Social modeling for requirements engineering
Miers, I., Garman, C., Green, M., Rubin, A.D.: Zerocoin: Anonymous distributed e-cash from bitcoin. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 397–411. IEEE (2013)
Acknowledgement
This work is part of project IREHDO2 funded by DGA/DGAC. The authors thank M. Michalski and Eric Lacombe, security experts at Airbus, for their useful comments. Finally, we would like to thanks the anonymous reviewers for their valuable inputs.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Bulusu, S.T., Laborde, R., Wazan, A.S., Barrère, F., Benzekri, A. (2017). Towards the Weaving of the Characteristics of Good Security Requirements. In: Cuppens, F., Cuppens, N., Lanet, JL., Legay, A. (eds) Risks and Security of Internet and Systems. CRiSIS 2016. Lecture Notes in Computer Science(), vol 10158. Springer, Cham. https://doi.org/10.1007/978-3-319-54876-0_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-54876-0_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-54875-3
Online ISBN: 978-3-319-54876-0
eBook Packages: Computer ScienceComputer Science (R0)