Presentation is loading. Please wait.

Presentation is loading. Please wait.

F122028 – VIVAN Kourosh. Authors Universidad de Murcia Ambrosio TOVAL, Reader in Software Engineering in the Department of Computing Joaquin NICOLAS Begona.

Similar presentations


Presentation on theme: "F122028 – VIVAN Kourosh. Authors Universidad de Murcia Ambrosio TOVAL, Reader in Software Engineering in the Department of Computing Joaquin NICOLAS Begona."— Presentation transcript:

1 F122028 – VIVAN Kourosh

2 Authors Universidad de Murcia Ambrosio TOVAL, Reader in Software Engineering in the Department of Computing Joaquin NICOLAS Begona MOROS, lecturer. She has a background in prototyping environment, software development and requirement engineering (RE)  Universidad Politécnica de Valencia Fernando GARCIS VIVAN Kourosh - ME 20132

3 Origins  CARMMA project: develop a risk analysis using MAGERIT in the Regional Information Systems and Telecommunications Office One year/ 5 analysts/ 50 stakeholders  Results Countermeasures costs could be lower if assets would be developed taking into security issue from the beginning. But MAGERIT countermeasures are linked to thread not assets. VIVAN Kourosh - ME 20133

4 Purpose  Method took place during elicitation and specification  Use a reused repository that contains Requirements from MAGERIT  Method focus on security of information system  Method result are: Specification documents and testing documents VIVAN Kourosh - ME 20134

5 Main phases 1. Requirements selection 2. Analysis and negociation 3. Documentation 4. Repository improvement 5. Validation VIVAN Kourosh - ME 20135

6 Create reused repository VIVAN Kourosh - ME 20136

7 Reused repository  Classified by domains and profiles Domains: finance, shop... Profiles: personal data law privacy, information system security…  Requirement can be parameterized or not VIVAN Kourosh - ME 20137

8 Requirements selection VIVAN Kourosh - ME 20138

9 Analysis and negotiation VIVAN Kourosh - ME 20139

10 Documentation VIVAN Kourosh - ME 201310

11 Repository improvement & Validation VIVAN Kourosh - ME 201311

12 Related litteratures  Toval, A., Nicolás, J., Moros, B., & García, F. (2002). Requirements reuse for improving information systems security: a practitioner’s approach.Requirements Engineering, 6(4), 205-219.  Sindre, G., Firesmith, D. G., & Opdahl, A. L. (2003, June). A reuse- based approach to determining security requirements. In Proceedings of the 9th international workshop on requirements engineering: foundation for software quality (REFSQ’03), Klagenfurt, Austria.  Gutiérrez, C., Moros, B., Toval, A., Fernández-Medina, E., & Piattini, M. (2005, August). Security requirements for web services based on SIREN. In Symposium on Requirements Engineering for Information Security, Paris, France.  Tsang, V. W. S. Towards Analysis of Templates for Security Requirements(Doctoral dissertation, University of Auckland). VIVAN Kourosh - ME 201312

13 PDD VIVAN Kourosh - ME 201313

14 Deliverables VIVAN Kourosh - ME 201314

15 Exemple  SyRS.3.5.2.S42. The maintainability contract of the electronic equipment shall include a clause enforcing the supplier to make a commitment to solve any failure in less than [time in minutes]. SyRS: System Requirement Specification document 3.5.2: Section number 3.5 System attributes S42 : Security requirement 42 IEEE 1233 standard VIVAN Kourosh - ME 201315

16 VIVAN Kourosh - ME 201316


Download ppt "F122028 – VIVAN Kourosh. Authors Universidad de Murcia Ambrosio TOVAL, Reader in Software Engineering in the Department of Computing Joaquin NICOLAS Begona."

Similar presentations


Ads by Google