TY - GEN
T1 - Empirical validation of security methods
AU - Labunets, K.
AU - Massacci, F.
PY - 2013
Y1 - 2013
N2 - Copyright © by the paper's authors.Security requirements engineering is an important part of many software projects. Practitioners consider security requirements from the early stages of software development processes, but most of them do not use any formal method for security requirements engineering. According to a recent survey, only about 9% security practitioners implement formal process of elicitation and analysis of security requirements and risks. However, a number of methods have been recently proposed in academia to support practitioners in collecting and analysing security requirements. Unfortunately, these methods are not widely adopted in practice because there is a lack of empirical evidence that they work. Only few papers in requirements engineering have a solid empirical evidence of efficiency of proposed solutions. So how can we know that security methods work in practice? In this paper we propose to conduct a series of empirical studies to build a basis that a) will provide security practitioners with guidelines for selection of security requirements methods, and b) will help methods designer understand how to improve their methods.
AB - Copyright © by the paper's authors.Security requirements engineering is an important part of many software projects. Practitioners consider security requirements from the early stages of software development processes, but most of them do not use any formal method for security requirements engineering. According to a recent survey, only about 9% security practitioners implement formal process of elicitation and analysis of security requirements and risks. However, a number of methods have been recently proposed in academia to support practitioners in collecting and analysing security requirements. Unfortunately, these methods are not widely adopted in practice because there is a lack of empirical evidence that they work. Only few papers in requirements engineering have a solid empirical evidence of efficiency of proposed solutions. So how can we know that security methods work in practice? In this paper we propose to conduct a series of empirical studies to build a basis that a) will provide security practitioners with guidelines for selection of security requirements methods, and b) will help methods designer understand how to improve their methods.
UR - https://www.scopus.com/pages/publications/84924365855
UR - https://www.scopus.com/inward/citedby.url?scp=84924365855&partnerID=8YFLogxK
M3 - Conference contribution
T3 - CEUR Workshop Proceedings
SP - 55
EP - 61
BT - Proceedings of the Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems, ESSoS-DS 2013
A2 - Heisel, M.
A2 - Marchetti, E.
PB - CEUR-WS
T2 - International Symposium on Engineering Secure Software and Systems, ESSoS-DS 2013
Y2 - 27 February 2013 through 1 March 2013
ER -