Skip to main content

Development of Agile Security Framework Using a Hybrid Technique for Requirements Elicitation

  • Conference paper
Advances in Computing, Communication and Control (ICAC3 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 125))

Abstract

Today’s competitive market demands immediate attention on security issues for developing secure software system. Security must be an integral part of any application development methodology. It becomes more challenging when developers design projects according to agile methodology. Traditional ways of development are sequential considering major changes during analysis. Agile methodology is required as there is a need for an iterative approach which encourages changes in requirements at any stage in software development lifecycle. In this paper, we are presenting a framework which effectively implements security practices in agile development and adopts additional features proposed by other researchers. The key point in our framework is that we are embedding a hybrid technique for requirement elicitation with Agile Software Development (ASD). This technique would combine abuser stories and attack trees drawing best features of each of their individual methods. This hybrid technique maps security threats found during security requirements effectively as compared to individual techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ge, X., Paige, R.F., Polack, F., Brooke, P.: Extreme Programming Security Practices. In: Concas, G., et al. (eds.) XP 2007. LNCS, vol. 4536, pp. 226–230. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  2. Siponen, M., Baskerville, R., Kuivalainen, T.: Integrating security into agile development methods. In: 38th Annual Hawaii International Conference on System Sciences (2005)

    Google Scholar 

  3. Gandotra, V., Singhal, A., Bedi, P.: Identifying Security Requirements Hybrid Technique. In: Proceedings of the 4th International Conference on Software Engineering Advances, Porto, Portugal, pp. 407–412. IEEE Computer Society, Los Alamitos (September 2009)

    Google Scholar 

  4. Peeters, J.: Agile Security Requirements Engineering. In: Requirements Engineering for Information Security (2005)

    Google Scholar 

  5. Beznosov, K.: Extreme Security Engineering: On Employing XP Practices to Achieve ’Good Enough Security’ without Defining It. In: First ACM Workshop on Business Driven Security Engineering (BizSec), Fairfax,VA (October 31, 2003)

    Google Scholar 

  6. Chivers, H., Paige, R.F., Ge, X.: Agile security using an incremental security architecture. In: Baumeister, H., Marchesi, M., Holcombe, M. (eds.) XP 2005. LNCS, vol. 3556, pp. 57–65. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. Myagmar, S., Lee, A.J., Yurcik, W.: Threat Modeling as a Basis for Security Requirements National Centre for Supercomputing Applications. Univ. of Illinois at Urbana-Champaign (2005)

    Google Scholar 

  8. Beznosov, K., Kruchten, P.: Towards Agile Security Assurance. In: The New Security Paradigms Workshop, White Point Beach Resort, Nova Scotia, Canada, September 20-23 (2004)

    Google Scholar 

  9. Ge, X., Paige, R.F., Polack, F., Chivers, H., Brooke, P.J.: Agile Development of Secure Web Applications. In: ICWE 2006, July 11-14. ACM, New York (2006)

    Google Scholar 

  10. Kotonya, G., Sommerville, I.: Requirements Engineering: Processes & Techniques. John Wiley & Sons, Chichester (1998)

    Google Scholar 

  11. Davies, R.: The power of stories. WWW Retrieved, Citeseer (2001)

    Google Scholar 

  12. Mellado, D., Fernández-Medina, E., Piattini, M.: A Comparative Study of Proposals for Establishing Security Requirements for the Development of Secure Information Systems. In: Gavrilova, M., et al. (eds.) ICCSA 2006. LNCS, vol. 3982, pp. 1044–1053. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  13. Daud, M.I.: Secure Software Development Model: A Guide for Secure Software Life Cycle. In: International MultiConference of Engineers & Computer Scientists, Hong Kong (2010)

    Google Scholar 

  14. Baskerville, R., Levine, L., Pries-Heje, J., Ramesh, B., Slaughter, S.: Is Internet speed Software Development Different? IEEE Software 20(6), 102–107 (2003)

    Article  Google Scholar 

  15. Kongsli, V.: Towards Agile Security in Web Applications. In: The Proceedings of OOPSLA, Portland, Oregon, USA, October 22-26. ACM, New York (2006)

    Google Scholar 

  16. Schneier, B.: Attack trees: Modeling Security Threats. Dr. Dobb’s Journal

    Google Scholar 

  17. Mauwl, S., Oostdijk, M.: Foundations of Attack Trees. P.1/32 (September 26, 2005)

    Google Scholar 

  18. Boström, G., Wäyrynen, J., Bodén, M., Beznosov, K.: Extending XP Practices to Support Security Requirements Engineering. In: SESS 2006, Shanghai, China, May 20-21 (2006)

    Google Scholar 

  19. Wäyrynen, J., Bodén, M., Boström, G.: Security Engineering and eXtreme Programming: An Impossible Marriage? In: Zannier, C., Erdogmus, H., Lindstrom, L. (eds.) XP/Agile Universe 2004. LNCS, vol. 3134, p. 117. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  20. Beck, K., et al.: Manifesto for Agile Software Development (February 2001)

    Google Scholar 

  21. The Agile Alliance Home Page, http://www.agilealliance.org/home

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sonia, Singhal, A. (2011). Development of Agile Security Framework Using a Hybrid Technique for Requirements Elicitation. In: Unnikrishnan, S., Surve, S., Bhoir, D. (eds) Advances in Computing, Communication and Control. ICAC3 2011. Communications in Computer and Information Science, vol 125. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-18440-6_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-18440-6_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-18439-0

  • Online ISBN: 978-3-642-18440-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics