Artifacts: An Efficient Approach for Reviewing Security-Related Aspects in Agile Requirements Specifications of Web Applications
Authors/Creators
- 1. PUC-Rio
- 2. Blekinge Institute of Technology
Description
Defects in requirements specifications can have severe consequences during the software development lifecycle. Some of them result in overall project failure due to incorrect or missing quality characteristics, such as security. This characteristic requires special attention in web applications because they have become a target for manipulating sensible data. Several concerns make security difficult to deal with. For instance, (1) when stakeholders discuss general requirements they are often unaware that they should also discuss security-related aspects, because (2) they typically do not have enough expertise in security. This often leads to unspecified or ill-defined security requirements. These concerns become even more challenging in agile contexts, where lightweight documentation is typically produced. To tackle this problem, we designed an approach for reviewing security-related aspects in agile requirements specifications of web applications. Our proposal considers user stories and security specifications as inputs and relates those user stories to security properties via Natural Language Processing. Based on the related security properties, our approach identifies high-level security requirements from the Open Web Application Security Project (OWASP) to be verified, and generates a reading technique to support reviewers in detecting defects. We evaluate our approach via three experiment trials conducted with 56 novice software engineers, measuring effectiveness, efficiency, usefulness, and ease to use. We compare our approach against using: (1) OWASP high-level security requirements, and (2) the perspective-based approach as proposed in contemporary state of the art. The results strengthen our confidence that using our approach has a positive impact (with large effect size) on the performance of inspectors in terms of effectiveness and efficiency.
Files
Files
(1.0 MB)
| Name | Size | Download all |
|---|---|---|
|
md5:c98ebf4212017c2a05f81d7f45298569
|
62.8 kB | Download |
|
md5:3ee66498207bd605224e4c348e9c01f7
|
64.8 kB | Download |
|
md5:01a8c3cec74763a222f7b37feb4ae034
|
63.1 kB | Download |
|
md5:0acbed99c8fda308f42a8d4aa945c43b
|
63.1 kB | Download |
|
md5:01a8c3cec74763a222f7b37feb4ae034
|
63.1 kB | Download |
|
md5:004ad6073f6bab470e16c2d94b707898
|
64.5 kB | Download |
|
md5:004ad6073f6bab470e16c2d94b707898
|
64.5 kB | Download |
|
md5:4a85e548278e09dfceb85da54c33889e
|
64.5 kB | Download |
|
md5:45a71c85518fa5a955c97be40660bd27
|
64.2 kB | Download |
|
md5:8308cd7e78e526563a07d0498e5599e6
|
127.9 kB | Download |
|
md5:39a5f960c88836875d92a5f859504ffd
|
74.5 kB | Download |
|
md5:9957ed0766f77fc7f79d7b9b44b8668c
|
74.4 kB | Download |
|
md5:333608165a556af45e807c2904f646a0
|
74.6 kB | Download |
|
md5:0ff0844cf1ac695d3138836614f7c799
|
74.7 kB | Download |
Additional details
Related works
- Is cited by
- Dataset: 10.5281/zenodo.3273298 (DOI)
- Conference paper: 10.1109/RE.2019.00020 (DOI)