Skip to Main content Skip to Navigation
Conference papers

Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach

Abstract : Since many decades, requirements engineering domain has seen significant enhancements towards adapting the security and risk analysis concepts. In this regard, there exist numerous security requirements engineering methodologies that support elicitation and evaluation of the security requirements. However, selecting a security requirements engineering methodology (SRE) for a given context of use often depends on a set of ad hoc criteria. In this paper, we propose a methodological evaluation methodology that helps in identifying the characteristics of a good SRE methodology.
Complete list of metadata

Cited literature [21 references]  Display  Hide  Download

https://hal.archives-ouvertes.fr/hal-02603703
Contributor : Open Archive Toulouse Archive Ouverte (oatao) <>
Submitted on : Saturday, May 16, 2020 - 9:06:41 AM
Last modification on : Wednesday, June 9, 2021 - 10:00:27 AM

File

bulusu_22242.pdf
Files produced by the author(s)

Identifiers

  • HAL Id : hal-02603703, version 1
  • OATAO : 22242

Citation

Sravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, François Barrere, Abdelmalek Benzekri. Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach. 12th International Conference on Availability, Reliability and Security (ARES 2017), Aug 2017, Reggio Calabria, Italy. pp.1-6. ⟨hal-02603703⟩

Share

Metrics

Record views

25

Files downloads

19