Computer Science ›› 2011, Vol. 38 ›› Issue (5): 14-19.

Previous Articles     Next Articles

Research on Eliciting Security Requirement Methods

JIN Ying,LIU Xin,ZHANG Jing   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Recently more and more attention has been paid to use active defense in software security because it provides a positive way to guarantee software security and effectively construct high-confidential software. Security requirements were critical to software security assurance. Eliciting security requirements was one of major and difficult tasks during the security assurance. Some typical methods about eliciting security requirements were studied, compared and analyzed with respect to their research methods, application, etc. The current status of different approaches to security requirements elicitation were summarized, and future trends were explored in the end. The above work will provide a valuable reference for carrying out research and application in security requirement engineering.

Key words: Software security,Active defense,Security rectuirements,Threat

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!