安全需求引出技术:误用案例和基于问题的信息系统的比较

N. Ikram, Surayya Siddiqui, N. Khan
{"title":"安全需求引出技术:误用案例和基于问题的信息系统的比较","authors":"N. Ikram, Surayya Siddiqui, N. Khan","doi":"10.1109/EmpiRE.2014.6890114","DOIUrl":null,"url":null,"abstract":"There are myriads of security elicitation techniques reported in the literature, but their industrial adoption is inadequate. Furthermore there is a shortage of empirical and comparative evaluations which can aid the software industry in this respect. This paper compares two security elicitation techniques - Misuse cases (MUC) and Issue based information systems (IBIS) by carrying out controlled experiments. A 2*2 factorial design was used with 30 undergraduate students selected randomly who solved security goal identification tasks on an individual basis using the two techniques. Two dependent variables chosen were; effectiveness of the techniques in terms of number of security goals identified and coverage of the techniques in terms of number of types of security goals, time taken to learn, execute and interpret results by each technique in three different situations. The main finding was that in a situation of low level of detail, the time taken to interpret results was lower in IBIS while in medium and high level of detail MUC is more effective for finding security goals and provides better coverage by taking less learning time. The generality of the results is limited due to the fact that undergraduate students participated in the experiment. The study provides guideline for the software industry about the choice of security elicitation technique in three different situations. The study can be extended by adding multiple techniques for comparison and a framework can be developed.","PeriodicalId":259907,"journal":{"name":"2014 IEEE 4th International Workshop on Empirical Requirements Engineering (EmpiRE)","volume":"167 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Security requirement elicitation techniques: The comparison of misuse cases and issue based information systems\",\"authors\":\"N. Ikram, Surayya Siddiqui, N. Khan\",\"doi\":\"10.1109/EmpiRE.2014.6890114\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"There are myriads of security elicitation techniques reported in the literature, but their industrial adoption is inadequate. Furthermore there is a shortage of empirical and comparative evaluations which can aid the software industry in this respect. This paper compares two security elicitation techniques - Misuse cases (MUC) and Issue based information systems (IBIS) by carrying out controlled experiments. A 2*2 factorial design was used with 30 undergraduate students selected randomly who solved security goal identification tasks on an individual basis using the two techniques. Two dependent variables chosen were; effectiveness of the techniques in terms of number of security goals identified and coverage of the techniques in terms of number of types of security goals, time taken to learn, execute and interpret results by each technique in three different situations. The main finding was that in a situation of low level of detail, the time taken to interpret results was lower in IBIS while in medium and high level of detail MUC is more effective for finding security goals and provides better coverage by taking less learning time. The generality of the results is limited due to the fact that undergraduate students participated in the experiment. The study provides guideline for the software industry about the choice of security elicitation technique in three different situations. The study can be extended by adding multiple techniques for comparison and a framework can be developed.\",\"PeriodicalId\":259907,\"journal\":{\"name\":\"2014 IEEE 4th International Workshop on Empirical Requirements Engineering (EmpiRE)\",\"volume\":\"167 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-09-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE 4th International Workshop on Empirical Requirements Engineering (EmpiRE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EmpiRE.2014.6890114\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 4th International Workshop on Empirical Requirements Engineering (EmpiRE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EmpiRE.2014.6890114","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

摘要

文献中报道了无数的安全诱导技术,但它们的工业应用是不够的。此外,缺乏能够在这方面帮助软件行业的实证和比较评估。通过对照实验,对误用案例(MUC)和基于问题的信息系统(IBIS)两种安全启发技术进行了比较。采用2*2因子设计,随机选择30名大学生,使用这两种技术解决个人安全目标识别任务。选择的两个因变量是;就所确定的安全目标的数量而言,技术的有效性;就安全目标类型的数量而言,技术的覆盖率;在三种不同情况下,每种技术学习、执行和解释结果所花费的时间。主要发现是,在低细节水平的情况下,在IBIS中解释结果所需的时间较低,而在中等和高细节水平的情况下,MUC更有效地找到安全目标,并通过花费更少的学习时间提供更好的覆盖范围。由于参与实验的是本科生,结果的通用性受到限制。该研究为软件行业在三种不同情况下安全启发技术的选择提供了指导。可以通过添加多种技术进行比较来扩展研究,并可以开发一个框架。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Security requirement elicitation techniques: The comparison of misuse cases and issue based information systems
There are myriads of security elicitation techniques reported in the literature, but their industrial adoption is inadequate. Furthermore there is a shortage of empirical and comparative evaluations which can aid the software industry in this respect. This paper compares two security elicitation techniques - Misuse cases (MUC) and Issue based information systems (IBIS) by carrying out controlled experiments. A 2*2 factorial design was used with 30 undergraduate students selected randomly who solved security goal identification tasks on an individual basis using the two techniques. Two dependent variables chosen were; effectiveness of the techniques in terms of number of security goals identified and coverage of the techniques in terms of number of types of security goals, time taken to learn, execute and interpret results by each technique in three different situations. The main finding was that in a situation of low level of detail, the time taken to interpret results was lower in IBIS while in medium and high level of detail MUC is more effective for finding security goals and provides better coverage by taking less learning time. The generality of the results is limited due to the fact that undergraduate students participated in the experiment. The study provides guideline for the software industry about the choice of security elicitation technique in three different situations. The study can be extended by adding multiple techniques for comparison and a framework can be developed.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信