{"title":"Risk-Based Security Requirements Model for Web Software","authors":"O. Ezenwoye, Yi Liu","doi":"10.1109/REW56159.2022.00051","DOIUrl":null,"url":null,"abstract":"With the proliferation of software vulnerabilities, tools are need to aid developers in infusing security requirements. This work introduces a risk-based security requirements model (RBSR) for web applications. With RBSR, security requirements for mitigating vulnerabilities are associated with weaknesses and risks. Events in the application’s functional requirements are also associated with risks. The functional requirements thus acquire the relevant security requirements. RBSR makes it possible to specify security requirements completely and consistently across use cases. The RBSR model is explained and a case study application is used to demonstrate the model.","PeriodicalId":360738,"journal":{"name":"2022 IEEE 30th International Requirements Engineering Conference Workshops (REW)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 30th International Requirements Engineering Conference Workshops (REW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/REW56159.2022.00051","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
With the proliferation of software vulnerabilities, tools are need to aid developers in infusing security requirements. This work introduces a risk-based security requirements model (RBSR) for web applications. With RBSR, security requirements for mitigating vulnerabilities are associated with weaknesses and risks. Events in the application’s functional requirements are also associated with risks. The functional requirements thus acquire the relevant security requirements. RBSR makes it possible to specify security requirements completely and consistently across use cases. The RBSR model is explained and a case study application is used to demonstrate the model.