Publication | Closed Access
Service Security Requirement Profiles for Telecom: How Software Engineers May Tackle Security
10
Citations
7
References
2011
Year
Unknown Venue
EngineeringInformation SecuritySecurity EngineeringSoftware EngineeringSecurity Requirement ProfilesSoftware AnalysisSecurity ModellingSecurity Requirement EngineeringSystems EngineeringSecurity ManagementSecure By DesignComputer ScienceSoftware DesignData SecurityCryptographyInformation Security ManagementSoftware TestingSecuritySecurity MeasurementDevelopment ProcessModel-driven Security
Security requirement engineering for services is in practice frequently performed by security non-experts. For them the security requirements and their dependencies are not directly known. To mitigate this, the paper suggests the usage of a business oriented security requirement profiles (e.g. VoIP, IP-TV...) containing information security, privacy, fraud/abuse, resilience and assurance requirements. The criteria and the creation process for such reusable and adaptable profiles are shown. Then the requirement profiles are set in context with a development process. We show how to stepwise adjust the profile to the actual service needs at development stages where the budget and knowledge are available. Finally, experiences from real projects are presented.
| Year | Citations | |
|---|---|---|
Page 1
Page 1