5
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      STORE: Security Threat Oriented Requirements Engineering Methodology

      Preprint
      , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          As we are continuously depending on information technology applications by adopting electronic channels and software applications for our business, online transaction and communication, software security is increasingly becoming a necessity and more advanced concern. Both the functional and non-functional requirements are important and provide the necessary needs at the early phases of the software development process, specifically in the requirement phase. The aim of this research is to identify security threats early in the software development process to help the requirement engineer elicit appropriate security requirements in a more systematic manner throughout the requirement engineering process to ensure a secure and quality software development. This article proposes the STORE methodology for security requirement elicitation based on security threats analysis, which includes the identification of four points: PoA, PoB, PoC and PoD for effective security attack analysis. Further, the proposed STORE methodology is also validated by a case study of an ERP System. We also compare our STORE methodology with two existing techniques, namely, SQUARE and MOSRE. We have shown that more effective and efficient security requirements can be elicited by the STORE methodology and that it helps the security requirement engineer to elicit security requirements in a more organized manner.

          Related collections

          Most cited references45

          • Record: found
          • Abstract: not found
          • Article: not found

          Enterprise resource planning: Implementation procedures and critical success factors

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            The critical success factors for ERP implementation: an organizational fit perspective

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Enterprise resource planning: A taxonomy of critical factors

                Bookmark

                Author and article information

                Journal
                05 January 2019
                Article
                1901.01500
                4f70aff7-eb10-4b5b-a265-906528181ef3

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                Journal of King Saud University - Computer and Information Sciences (2018)
                cs.SE

                Software engineering
                Software engineering

                Comments

                Comment on this article