Logo Kérwá
 

Identifying the implied: Findings from three differentiated replications on the use of security requirements templates

dc.creatorRiaz, Maria
dc.creatorKing, Jason
dc.creatorSlankas, John
dc.creatorWilliams, Laurie
dc.creatorMassacci, Fabio
dc.creatorQuesada López, Christian Ulises
dc.creatorJenkins Coronas, Marcelo
dc.date.accessioned2017-11-22T20:11:38Z
dc.date.available2017-11-22T20:11:38Z
dc.date.issued2017
dc.description.abstractIdentifying security requirements early on can lay the foundation for secure software development. Security requirements are often implied by existing functional requirements but are mostly left unspecified. The Security Discoverer (SD) process automatically identifies security implications of individual requirements sentences and suggests applicable security requirements templates. The objective of this research is to support requirements analysts in identifying security requirements by automating the suggestion of security requirements templates that are implied by existing functional requirements. We conducted a controlled experiment in a graduate-level security class at North Carolina State University (NCSU) to evaluate the SD process in eliciting implied security requirements in 2014. We have subsequently conducted three differentiated replications to evaluate the generalizability and applicability of the initial findings. The replications were conducted across three countries at the University of Trento, NCSU, and the University of Costa Rica. We evaluated the responses of the 205 total participants in terms of quality, coverage, relevance and efficiency. We also develop shared insights regarding the impact of context factors such as time, motivation and support, on the study outcomes and provide lessons learned in conducting the replications. Treatment group, using the SD process, performed significantly better than the control group (at p-value <0.05) in terms of the coverage of the identified security requirements and efficiency of the requirements elicitation process in two of the three replications, supporting the findings of the original study. Participants in the treatment group identified 84 % more security requirements in the oracle as compared to the control group on average. Overall, 80 % of the 111 participants in the treatment group were favorable towards the use of templates in identifying security requirements. Our qualitative findings indicate that participants may be able to differentiate between relevant and extraneous templates suggestions and be more inclined to fill in the templates with additional support. Security requirements templates capture the security knowledge of multiple experts and can support the security requirements elicitation process when automatically suggested, making the implied security requirements more evident. However, individual participants may still miss out on identifying a number of security requirements due to empirical constraints as well as potential limitations on knowledge and security expertise.es_ES
dc.description.procedenceUCR::Vicerrectoría de Investigación::Unidades de Investigación::Ingeniería::Centro de Investigaciones en Tecnologías de Información y Comunicación (CITIC)es_ES
dc.description.sponsorshipUniversity of Costa Rica Project/[No. 834-B5-A18]/UCR/Costa Ricaes_ES
dc.description.sponsorshipTechnology and Telecommunications/[]/MICITT/Costa Ricaes_ES
dc.identifier.citationhttps://link.springer.com/article/10.1007%2Fs10664-016-9481-1
dc.identifier.doi10.1007/s10664-016-9481-1
dc.identifier.issn1382-3256
dc.identifier.issn1573-7616
dc.identifier.urihttps://hdl.handle.net/10669/73473
dc.language.isoen_USes_ES
dc.rightsacceso abierto
dc.sourceEmpirical Software Engineering; Volumen 22, Número 4. 2017es_ES
dc.subjectSecurity requirementses_ES
dc.subjectControlled experimentes_ES
dc.subjectReplicationes_ES
dc.subjectRequirements engineeringes_ES
dc.subjectTemplateses_ES
dc.subjectPatternses_ES
dc.subjectAutomationes_ES
dc.titleIdentifying the implied: Findings from three differentiated replications on the use of security requirements templateses_ES
dc.typeartículo original

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
0version final.pdf
Size:
3.13 MB
Format:
Adobe Portable Document Format
Description:
Versión final

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.38 KB
Format:
Item-specific license agreed upon to submission
Description: