Security Requirements Assurance: An Assurance Case Perspective

In the current era, software security requirements domain has changed thoroughly, and has been considered an essential aspect for software quality. Machine learning and artificial intelligence have become the emerging trends to automate the identification and specification of security requirements....

Full description

Saved in:
Bibliographic Details
Main Authors: Janisar, A.A., Kalid, K.S.B., Sarlan, A.B., Gilal, A.R.
Format: Conference or Workshop Item
Published: Institute of Electrical and Electronics Engineers Inc. 2023
Online Access:http://scholars.utp.edu.my/id/eprint/38021/
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85175471070&doi=10.1109%2fICSECS58457.2023.10256374&partnerID=40&md5=742a6bf6b06f75db6b2e11ab9ade67eb
Tags: Add Tag
No Tags, Be the first to tag this record!
id oai:scholars.utp.edu.my:38021
record_format eprints
spelling oai:scholars.utp.edu.my:380212023-12-11T03:01:10Z http://scholars.utp.edu.my/id/eprint/38021/ Security Requirements Assurance: An Assurance Case Perspective Janisar, A.A. Kalid, K.S.B. Sarlan, A.B. Gilal, A.R. In the current era, software security requirements domain has changed thoroughly, and has been considered an essential aspect for software quality. Machine learning and artificial intelligence have become the emerging trends to automate the identification and specification of security requirements. As an active research area, security requirements specifications are recognized and persuaded in software engineering and security assurance communities. Overfitting of security requirements after system design can result in security issues in current system architecture. Consistency, completeness, and correctness are critical requirements for ensuring the effectiveness of systems architecture. However, without these security requirements, the system is vulnerable to attacks and organization's assets, and its reputation is at risk. Moreover, it increases the cost and time to fix the security problem. Therefore, to avoid such problems security requirements need to be identified more precisely and consistently. Realizing the benefits of assurance case, A conceptual framework is proposed for identification of security requirements correctness, consistency and completeness using assurance case. Objective of the proposed conceptual framework to assist the security requirement engineer to identify the security requirements using assurance case during requirement phase i.e., the security requirements are correct, complete, and consistent. The proposed conceptual framework involves five phases: (1) assets identification, (2) threat identification, (3) security objectives, (4) security requirements identification and (5) security requirement assessment. © 2023 IEEE. Institute of Electrical and Electronics Engineers Inc. 2023 Conference or Workshop Item NonPeerReviewed Janisar, A.A. and Kalid, K.S.B. and Sarlan, A.B. and Gilal, A.R. (2023) Security Requirements Assurance: An Assurance Case Perspective. In: UNSPECIFIED. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85175471070&doi=10.1109%2fICSECS58457.2023.10256374&partnerID=40&md5=742a6bf6b06f75db6b2e11ab9ade67eb 10.1109/ICSECS58457.2023.10256374 10.1109/ICSECS58457.2023.10256374 10.1109/ICSECS58457.2023.10256374
institution Universiti Teknologi Petronas
building UTP Resource Centre
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Petronas
content_source UTP Institutional Repository
url_provider http://eprints.utp.edu.my/
description In the current era, software security requirements domain has changed thoroughly, and has been considered an essential aspect for software quality. Machine learning and artificial intelligence have become the emerging trends to automate the identification and specification of security requirements. As an active research area, security requirements specifications are recognized and persuaded in software engineering and security assurance communities. Overfitting of security requirements after system design can result in security issues in current system architecture. Consistency, completeness, and correctness are critical requirements for ensuring the effectiveness of systems architecture. However, without these security requirements, the system is vulnerable to attacks and organization's assets, and its reputation is at risk. Moreover, it increases the cost and time to fix the security problem. Therefore, to avoid such problems security requirements need to be identified more precisely and consistently. Realizing the benefits of assurance case, A conceptual framework is proposed for identification of security requirements correctness, consistency and completeness using assurance case. Objective of the proposed conceptual framework to assist the security requirement engineer to identify the security requirements using assurance case during requirement phase i.e., the security requirements are correct, complete, and consistent. The proposed conceptual framework involves five phases: (1) assets identification, (2) threat identification, (3) security objectives, (4) security requirements identification and (5) security requirement assessment. © 2023 IEEE.
format Conference or Workshop Item
author Janisar, A.A.
Kalid, K.S.B.
Sarlan, A.B.
Gilal, A.R.
spellingShingle Janisar, A.A.
Kalid, K.S.B.
Sarlan, A.B.
Gilal, A.R.
Security Requirements Assurance: An Assurance Case Perspective
author_facet Janisar, A.A.
Kalid, K.S.B.
Sarlan, A.B.
Gilal, A.R.
author_sort Janisar, A.A.
title Security Requirements Assurance: An Assurance Case Perspective
title_short Security Requirements Assurance: An Assurance Case Perspective
title_full Security Requirements Assurance: An Assurance Case Perspective
title_fullStr Security Requirements Assurance: An Assurance Case Perspective
title_full_unstemmed Security Requirements Assurance: An Assurance Case Perspective
title_sort security requirements assurance: an assurance case perspective
publisher Institute of Electrical and Electronics Engineers Inc.
publishDate 2023
url http://scholars.utp.edu.my/id/eprint/38021/
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85175471070&doi=10.1109%2fICSECS58457.2023.10256374&partnerID=40&md5=742a6bf6b06f75db6b2e11ab9ade67eb
_version_ 1787138256421257216
score 13.214268