Abstract
Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current product line practices in requirements engineering do not adequately address security requirements engineering. Therefore, in this chapter we will propose a security requirements engineering process (SREPPLine) driven by security standards and based on a security requirements decision model along with a security variability model to manage the variability of the artefacts related to security requirements. The aim of this approach is to deal with security requirements from the early stages of the product line development in a systematic way, in order to facilitate conformance with the most relevant security standards with regard to the management of security requirements, such as ISO/IEC 27001 and ISO/IEC 15408.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bosh, J.: Design & Use of Software Architectures. Pearson Education Limited, London (2000)
Clements, P., Northrop, L.: Software Product Lines: Practices and Patterns. Addison-Wesley, Reading (2002)
Birk, A., Heller, G.: Challenges for requirements engineering and management in software product line development. In: Sawyer, P., Paech, B., Heymans, P. (eds.) REFSQ 2007. LNCS, vol. 4542, pp. 300–305. Springer, Heidelberg (2007)
Niemelä, E., Immonen, A.: Capturing quality requirements of product family architecture. Information & Software Technology 49, 1107–1120 (2007)
Mellado, D., Fernández-Medina, E., Piattini, M.: A Common Criteria Based Security Requirements Engineering Process for the Development of Secure Information Systems. Computer Standards and Interfaces 29, 244–253 (2007)
Mellado, D., Fernández-Medina, E., Piattini, M.: Applying a Security Requirements Engineering Process. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 192–206. Springer, Heidelberg (2006)
Mellado, D., Fernández-Medina, E., Piattini, M.: Towards security requirements management for software product lines: a security domain requirements engineering process. Computer Standards & Interfaces 30, 361–371 (2008)
ISO/IEC, ISO/IEC 27001 Information technology – Security techniques – Information security management systems – Requirements (2006)
ISO/IEC, ISO/IEC 15408:2005 Information technology - Security techniques - Evaluation criteria for IT security (Common Criteria v3.0) (2005)
Kang, K., Cohen, S., Hess, J.A., Novak, W.E., Peterson, S.A.: Feature-Oriented Domain Analysis (FODA) Feasibility Study. Software Engineering Institute, Carnegie-Mellon University (1990)
Pohl, K., Böckle, G., van de Linden, F.: Software Product Line Engineering. Foundations, Principles and Techniques. Springer, Heidelberg (2005)
Firesmith, D.G.: Engineering Security Requirements. Journal of Object Technology 2, 53–68 (2003)
Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requirements Engineering 10 1, 34–44 (2005)
ISO/IEC, ISO/IEC 13335 Information technology - Security techniques - Management of information and communications technology security (2004)
López, F., Amutio, M.A., Candau, J., Mañas, J.A.: Methodology for Information Systems Risk Analysis and Management. Ministry of Public Administration (2005)
Kotonya, G., Sommerville, I.: Requirements Engineering Process and Techniques. John Willey & Sons, West Sussex (2000)
OMG_(Object_Management_Group), Reusable Assets Specification (RAS): ptc/04-06-06 (2004)
Chung, L., Nixon, B., Yu, E., Mylopoulos, J.: Non-Functional Requirements in Software Engineering. Kluwer Academic Publishers, Dordrecht (2000)
Jürjens, J.: UMLsec: Extending UML for secure systems development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412–425. Springer, Heidelberg (2002)
Kuloor, C., Eberlein, A.: Aspect-Oriented Requirements Engineering for Software Product Lines. In: Proceedings of the 10th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, ECBS 2003 (2003) (presented)
ISO/IEC, ISO/IEC 15446 Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets (2004)
SEI, +SAFE, V1.2 A Safety Extension to CMMI-DEV V1.2. Software Engineering Institute, Carnegie Mellon University, Pittsburgh (U.S.A.) (2007)
Faegri, T.E., Hallsteinsen, S.: A Software Product Line Reference Architecture for Security. In: Käkölä, T., Dueñas, J.C. (eds.) Software Product Lines: Research Issues in Engineering and Management. Springer, Heidelberg (2006)
Arciniegas, J.L., Dueñas, J.C., Ruiz, J.L., Cerón, R., Bermejo, J., Oltra, M.A.: Architecture Reasoning for Supporting Product Line Evolution: An Example on Security. In: Käkölä, T., Dueñas, J.C. (eds.) Software Product Lines: Research Issues in Engineering and Management. Springer, Heidelberg (2006)
Haley, C.B., Laney, R., Moffett, J.D., Nuseibeh, B.: Using trust assumptions with security requirements. Requirements Engineering 11, 138–151 (2006)
Mead, N.R., Hough, E., Stehney, T.: Security Quality Requirements Engineering (SQUARE) Methodology (CMU/SEI-2005-TR-009). Software Engineering Institute, Carnegie Mellon University, Pittsburgh, USA (2005)
Liu, L., Yu, E.S.K., Mylopoulos, J.: Security and Privacy Requirements Analysis within Social Setting. In: 11th IEEE International Requirements Engineering Conference, RE 2003 (2003)
Giorgini, P., Mouratidis, H., Zannone, N.: Modelling Security and Trust with Secure Tropos. In: Mouratidis, H., Giorgini, P. (eds.) Integrating Security and Software Engineering: Advances and Future Visions, pp. 160–189. Idea Group Publishing, USA (2007)
Mellado, D., Fernández-Medina, E., Piattini, M.: A Comparative Study of Proposals for Establishing Security Requirements for the Development of Secure Information Systems. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3982, pp. 1044–1053. Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mellado, D., Fernández-Medina, E., Piattini, M. (2009). Security Requirements Management in Software Product Line Engineering. In: Filipe, J., Obaidat, M.S. (eds) e-Business and Telecommunications. ICETE 2008. Communications in Computer and Information Science, vol 48. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-05197-5_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-05197-5_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-05196-8
Online ISBN: 978-3-642-05197-5
eBook Packages: Computer ScienceComputer Science (R0)