Professional Documents
Culture Documents
Reusable Knowledge in Security Requirements Engineering: Research Papers
Reusable Knowledge in Security Requirements Engineering: Research Papers
Requirements Engineering
Research
Papers
Available/Collected Data
SECURITY
Expose to Hack/Manipulation
Someone Else taking it Away
AIM
Existing Surveys/Proposals/Techniques/Tools/Modelling
Frameworks & Considerable Methods Available for
Security Requirements Engineering from No Reference for Researchers
Last 2 DECADES. In Systematic Way.
GOAL
Conducting Literature Review to:
- Identifying
- Analysing
- Categorising
By Covering more than 30 Approaches
4.1.3 Quality Criteria :Screening of Papers
• English Publication
Approach
Tool
Solution Proposal
+
Validation
Papers Classification
In Depth surveying of different approaches for SRE in context of knowledge reuse, helped in
defining different Categories and CONSTRUCT of FRAMEWORK.
• Semi-automated(e.g., process)
• Technology features
4.3 Systematic Mapping Details
Columns : Concepts Characterizing the Conceptual Coloured Cells : Existing Publication Proposing Reuse
Space of Security Approach
Lines : Different Reuse forms by SRE Methods Dark Cells : More number of Publications
White Cells : No Publication
Moving onto Different Methods
4.3.6 Methods that do not (re)use security
knowledge
The SMAP found that there are a wide variety of SRE methods that do not consider knowledge reuse during the
SRE process.
Secure I*