There is a newer version of the record available.

Published March 12, 2020 | Version v1
Dataset Open

Artifacts: An Efficient Approach for Reviewing Security-Related Aspects in Agile Requirements Specifications of Web Applications

  • 1. PUC-Rio
  • 2. Blekinge Institute of Technology

Description

Defects in requirements specifications can have severe consequences during the software development lifecycle. Some of them result in overall project failure due to incorrect or missing quality characteristics, such as security. This characteristic requires special attention in web applications because they have become a target for manipulating sensible data. Several concerns make security difficult to deal with. For instance, (1) when stakeholders discuss general requirements they are often unaware that they should also discuss security-related aspects, because (2) they typically do not have enough expertise in security. This often leads to unspecified or ill-defined security requirements. These concerns become even more challenging in agile contexts, where lightweight documentation is typically produced. To tackle this problem, we designed an approach for reviewing security-related aspects in agile requirements specifications of web applications. Our proposal considers user stories and security specifications as inputs and relates those user stories to security properties via Natural Language Processing. Based on the related security properties, our approach identifies high-level security requirements from the Open Web Application Security Project (OWASP) to be verified, and generates a reading technique to support reviewers in detecting defects. We evaluate our approach via three experiment trials conducted with 56 novice software engineers, measuring effectiveness, efficiency, usefulness, and ease to use. We compare our approach against using: (1) OWASP high-level security requirements, and (2) the perspective-based approach as proposed in contemporary state of the art. The results strengthen our confidence that using our approach has a positive impact (with large effect size) on the performance of inspectors in terms of effectiveness and efficiency.

Files

Files (1.0 MB)

Name Size Download all
md5:c98ebf4212017c2a05f81d7f45298569
62.8 kB Download
md5:3ee66498207bd605224e4c348e9c01f7
64.8 kB Download
md5:01a8c3cec74763a222f7b37feb4ae034
63.1 kB Download
md5:0acbed99c8fda308f42a8d4aa945c43b
63.1 kB Download
md5:01a8c3cec74763a222f7b37feb4ae034
63.1 kB Download
md5:004ad6073f6bab470e16c2d94b707898
64.5 kB Download
md5:004ad6073f6bab470e16c2d94b707898
64.5 kB Download
md5:4a85e548278e09dfceb85da54c33889e
64.5 kB Download
md5:45a71c85518fa5a955c97be40660bd27
64.2 kB Download
md5:8308cd7e78e526563a07d0498e5599e6
127.9 kB Download
md5:39a5f960c88836875d92a5f859504ffd
74.5 kB Download
md5:9957ed0766f77fc7f79d7b9b44b8668c
74.4 kB Download
md5:333608165a556af45e807c2904f646a0
74.6 kB Download
md5:0ff0844cf1ac695d3138836614f7c799
74.7 kB Download

Additional details

Related works

Is cited by
Dataset: 10.5281/zenodo.3273298 (DOI)
Conference paper: 10.1109/RE.2019.00020 (DOI)