A Template-Based Approach To Write Complete Security Requirements For Software Development Environment

Mustafa, Nuridawati (2020) A Template-Based Approach To Write Complete Security Requirements For Software Development Environment. Doctoral thesis, Universiti Teknikal Malaysia Melaka.

[img] Text (24 Pages)
A Template-Based Approach To Write Complete Security Requirements For Software Development Environment.pdf - Submitted Version

Download (895kB)
[img] Text (Full Text)
A Template-Based Approach To Write Complete Security Requirements For Software Development Environment.pdf - Submitted Version
Restricted to Registered users only

Download (6MB)

Abstract

Writing quality security requirements contributes to the success of secure software development. It has been a common practice to include security requirements in a software system after the system is defined. Thus, incorporating security requirements at a later stage of software development will increase the risks of security vulnerabilities in software development. However, the process of writing security requirements is tedious and complex. There are a few gaps found in the existing works, categorized into method- related and people-related issues. The method-related issues include the lack of checking on security requirements completeness, security requirements templates, security standards used as reference and automated tool for validation. While, the people-related issues consist of inexperienced requirements engineers, minimal involvement of technical team in defining security requirements and language barriers. Motivated from these gaps, the main objective of this study is to propose a template-based approach to write complete security requirements. This study proposes a new template-based approach to assist the requirements engineers and client-stakeholders for writing complete security requirements. For this, we integrate the template-based approach with security requirements density using probability ratio, syntax-based density using lexical density and security requirements completeness prioritization using numerical assignment. We also developed two new pattern libraries, SecLib and SRCLib to validate the syntax and the completeness of security requirements. Additionally, an automated tool support called SecureMEReq was also developed to realize the approach. Finally, a comprehensive evaluation of the approach, comprising the comparison study between manual and automated tool as well as usability test were conducted. In summary, the findings of the evaluations show that our approach can contribute to the body of knowledge of requirements engineering, especially in enhancing the completeness of writing security requirements. It is found that the approach is able to enhance the completeness level of security requirements compared to the manual approach and produce a complete generation of security requirements. The results of the usability tests show that the approach is useful and helpful in eliciting complete security requirements of software development and able to ease the security requirements elicitation process.

Item Type: Thesis (Doctoral)
Uncontrolled Keywords: Computer security, Computer software, Data encryption (Computer science), Security Requirements, Software Development Environment
Subjects: Q Science > Q Science (General)
Q Science > QA Mathematics
Divisions: Library > Tesis > FTMK
Depositing User: F Haslinda Harun
Date Deposited: 07 Dec 2021 16:26
Last Modified: 07 Dec 2021 16:26
URI: http://eprints.utem.edu.my/id/eprint/25407
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item