Artifacts: An Approach for Reviewing Security Related Apects in Agile Requirements Specifications of Web Applications
Description
Abstract—Defects in requirements specifications can have severe consequences during the software development lifecycle. Some of them result in overall project failure due to incorrect or missing quality characteristics. Security is one of those uality characteristics that need to be considered in early phases. There are several concerns that make security difficult to deal with; for instance, (1) when stakeholders discuss general requirements in (review) meetings, they are often not aware that they should also discuss security-related topics, and in the rather rare cases they are aware (2), they typically do not have sufficient security expertise. This picture is even more challenging in agile development contexts, where lightweight documentation are typically involved. To address these issues, we designed an approach that considers user stories and security specifications as input and relates those user stories to security properties via Natural Language Processing (NLP) techniques. Based on the related security properties, our approach then identifies high-level security requirements from the Open Web Application Security Project (OWASP) to be verified afterwards. In a last step, the verification of the generated security requirements is then conducted via a focused reading technique. We finally validate our approach via a controlled experiment comparing the effectiveness and efficiency of novice inspectors (we used two different groups of students) verifying security aspects in agile requirements using our generated reading techniques against using the complete list of OWASP high level security requirements and a the same list of defect types embedded in our technique. The (statistically significant) results indicate that using the reading technique has a positive impact (with large effect size) on the performance of inspectors in terms of effectiveness and efficiency.
This repository also contains:
Artifacts used and results of the experimental study of the paper entitled "An Approach for Reviewing Security Related Apects in Agile Requirements Specifications of Web Applications".
Files
Files
(298.1 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:f8db34105f13dac58fcba3d795d17acd
|
17.1 kB | Download |
|
md5:8f2e564a5bc7748c1af10efcdff445c8
|
19.2 kB | Download |
|
md5:827e9e1bae7910c1ecd1233b69e81949
|
21.1 kB | Download |
|
md5:3bab7ffffc209c848f0c2a6e527bb61f
|
17.4 kB | Download |
|
md5:fba35852faf5d49b0fc185159b09af00
|
17.4 kB | Download |
|
md5:ebfb04d8b4a4aeb382c02501fe33de7a
|
14.7 kB | Download |
|
md5:3d51b4ef6eff4fa509697511035cba35
|
18.8 kB | Download |
|
md5:7659a8a26b48329ef3ee5aeebcc5cc63
|
18.8 kB | Download |
|
md5:9379f67178b387a6947d7b071ef39d5e
|
18.8 kB | Download |
|
md5:b91c5d666496449cae657a014cd1c3e9
|
18.4 kB | Download |
|
md5:52aad0fc7177cce832b3e7e92a9bdfb9
|
28.8 kB | Download |
|
md5:5da49a51f408d1dbe0923538078ea721
|
28.8 kB | Download |
|
md5:b500c5c5ca2ec6b20276e6e97db4340c
|
29.1 kB | Download |
|
md5:ed76954f80a1668c0e19325263578d4c
|
29.7 kB | Download |