{"title":"基于映射研究的问题框架的软件安全关注点提取","authors":"Shuhui Wu, Cheng Zhang, Futian Wang","doi":"10.1109/APSECW.2017.29","DOIUrl":null,"url":null,"abstract":"Context: Although the security of software development has been extensively studied, it has little empirical knowledge about the security aspect during software development. And also Problem Frames provides a systematic way for analysing requirement, but it also lacks empirical evidence.Objectives: In order to design security enhancement pattern for system, we combined security concerns with problem frames.Method: We performed a comprehensive mapping study to extract the security indexes and security concerns from the categorized papers.Results: We identified 406 candidate papers, of these, 184 articles generated security indexes, and 18 articles generated security concerns. According to the meaning of each security index, we matched security concerns for them. Furthermore, security concerns are applied to the domain of the problem frames.Conclusions: Through applying a mapping study, we extracted 3 security indexes and 4 security concerns. And we analysed how these concerns matched to the Problem Frames.","PeriodicalId":172357,"journal":{"name":"2017 24th Asia-Pacific Software Engineering Conference Workshops (APSECW)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Extracting Software Security Concerns of Problem Frames Based on a Mapping Study\",\"authors\":\"Shuhui Wu, Cheng Zhang, Futian Wang\",\"doi\":\"10.1109/APSECW.2017.29\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Context: Although the security of software development has been extensively studied, it has little empirical knowledge about the security aspect during software development. And also Problem Frames provides a systematic way for analysing requirement, but it also lacks empirical evidence.Objectives: In order to design security enhancement pattern for system, we combined security concerns with problem frames.Method: We performed a comprehensive mapping study to extract the security indexes and security concerns from the categorized papers.Results: We identified 406 candidate papers, of these, 184 articles generated security indexes, and 18 articles generated security concerns. According to the meaning of each security index, we matched security concerns for them. Furthermore, security concerns are applied to the domain of the problem frames.Conclusions: Through applying a mapping study, we extracted 3 security indexes and 4 security concerns. And we analysed how these concerns matched to the Problem Frames.\",\"PeriodicalId\":172357,\"journal\":{\"name\":\"2017 24th Asia-Pacific Software Engineering Conference Workshops (APSECW)\",\"volume\":\"180 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 24th Asia-Pacific Software Engineering Conference Workshops (APSECW)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/APSECW.2017.29\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 24th Asia-Pacific Software Engineering Conference Workshops (APSECW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APSECW.2017.29","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Extracting Software Security Concerns of Problem Frames Based on a Mapping Study
Context: Although the security of software development has been extensively studied, it has little empirical knowledge about the security aspect during software development. And also Problem Frames provides a systematic way for analysing requirement, but it also lacks empirical evidence.Objectives: In order to design security enhancement pattern for system, we combined security concerns with problem frames.Method: We performed a comprehensive mapping study to extract the security indexes and security concerns from the categorized papers.Results: We identified 406 candidate papers, of these, 184 articles generated security indexes, and 18 articles generated security concerns. According to the meaning of each security index, we matched security concerns for them. Furthermore, security concerns are applied to the domain of the problem frames.Conclusions: Through applying a mapping study, we extracted 3 security indexes and 4 security concerns. And we analysed how these concerns matched to the Problem Frames.