There is a newer version of the record available.

Published April 5, 2019 | Version v1
Dataset Open

Artifacts: An Approach for Reviewing Security Related Apects in Agile Requirements Specifications of Web Applications

  • 1. Anonymous

Description

Abstract—Defects in requirements specifications can have severe consequences during the software development lifecycle. Some of them result in overall project failure due to incorrect or missing quality characteristics. Security is one of those uality characteristics that need to be considered in early phases. There are several concerns that make security difficult to deal with; for instance, (1) when stakeholders discuss general requirements in (review) meetings, they are often not aware that they should also discuss security-related topics, and in the rather rare cases they are aware (2), they typically do not have sufficient security expertise. This picture is even more challenging in agile development contexts, where lightweight documentation are typically involved. To address these issues, we designed an approach that considers user stories and security specifications as input and relates those user stories to security properties via Natural Language Processing (NLP) techniques. Based on the related security properties, our approach then identifies high-level security requirements from the Open Web Application Security Project (OWASP) to be verified afterwards. In a last step, the verification of the generated security requirements is then conducted via a focused reading technique. We finally validate our approach via a controlled experiment comparing the effectiveness and efficiency of novice inspectors (we used two different groups of students) verifying security aspects in agile requirements using our generated reading techniques against using the complete list of OWASP high level security requirements and a the same list of defect types embedded in our technique. The (statistically significant) results indicate that using the reading technique has a positive impact (with large effect size) on the performance of inspectors in terms of effectiveness and efficiency. 

This repository also contains:

Artifacts used and results of the experimental study of the paper entitled "An Approach for Reviewing Security Related Apects in Agile Requirements Specifications of Web Applications".

Files

Files (298.1 kB)

Name Size Download all
md5:f8db34105f13dac58fcba3d795d17acd
17.1 kB Download
md5:8f2e564a5bc7748c1af10efcdff445c8
19.2 kB Download
md5:827e9e1bae7910c1ecd1233b69e81949
21.1 kB Download
md5:3bab7ffffc209c848f0c2a6e527bb61f
17.4 kB Download
md5:fba35852faf5d49b0fc185159b09af00
17.4 kB Download
md5:ebfb04d8b4a4aeb382c02501fe33de7a
14.7 kB Download
md5:3d51b4ef6eff4fa509697511035cba35
18.8 kB Download
md5:7659a8a26b48329ef3ee5aeebcc5cc63
18.8 kB Download
md5:9379f67178b387a6947d7b071ef39d5e
18.8 kB Download
md5:b91c5d666496449cae657a014cd1c3e9
18.4 kB Download
md5:52aad0fc7177cce832b3e7e92a9bdfb9
28.8 kB Download
md5:5da49a51f408d1dbe0923538078ea721
28.8 kB Download
md5:b500c5c5ca2ec6b20276e6e97db4340c
29.1 kB Download
md5:ed76954f80a1668c0e19325263578d4c
29.7 kB Download