@inproceedings{067586bc3c07491ead1f6d017159eac1,
title = "Empirical validation of security methods",
abstract = "Copyright {\textcopyright} by the paper's authors.Security requirements engineering is an important part of many software projects. Practitioners consider security requirements from the early stages of software development processes, but most of them do not use any formal method for security requirements engineering. According to a recent survey, only about 9% security practitioners implement formal process of elicitation and analysis of security requirements and risks. However, a number of methods have been recently proposed in academia to support practitioners in collecting and analysing security requirements. Unfortunately, these methods are not widely adopted in practice because there is a lack of empirical evidence that they work. Only few papers in requirements engineering have a solid empirical evidence of efficiency of proposed solutions. So how can we know that security methods work in practice? In this paper we propose to conduct a series of empirical studies to build a basis that a) will provide security practitioners with guidelines for selection of security requirements methods, and b) will help methods designer understand how to improve their methods.",
author = "K. Labunets and F. Massacci",
year = "2013",
language = "English",
series = "CEUR Workshop Proceedings",
publisher = "CEUR-WS",
pages = "55--61",
editor = "M. Heisel and E. Marchetti",
booktitle = "Proceedings of the Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems, ESSoS-DS 2013",
note = "International Symposium on Engineering Secure Software and Systems, ESSoS-DS 2013 ; Conference date: 27-02-2013 Through 01-03-2013",
}