Using SAE J3061 for Automotive Security Requirement Engineering

Author(s):  
Christoph Schmittner ◽  
Zhendong Ma ◽  
Carolina Reyes ◽  
Oliver Dillinger ◽  
Peter Puschner
2011 ◽  
Vol 1 (6) ◽  
pp. 111-112
Author(s):  
Velayutham Pavanasam ◽  
◽  
Chandrasekaran Subramaniam

2021 ◽  
Vol 1 (3) ◽  
pp. 422-452
Author(s):  
Romain Laborde ◽  
Sravani Teja Bulusu ◽  
Ahmad Samer Wazan ◽  
Arnaud Oglaza ◽  
Abdelmalek Benzekri

An effective network security requirement engineering is needed to help organizations in capturing cost-effective security solutions that protect networks against malicious attacks while meeting the business requirements. The diversity of currently available security requirement engineering methodologies leads security requirements engineers to an open question: How to choose one? We present a global evaluation methodology that we applied during the IREHDO2 project to find a requirement engineering method that could improve network security. Our evaluation methodology includes a process to determine pertinent evaluation criteria and a process to evaluate the requirement engineering methodologies. Our main contribution is to involve stakeholders (i.e., security requirements engineers) in the evaluation process by following a requirement engineering approach. We describe our experiments conducted during the project with security experts and the feedback we obtained. Although we applied it to evaluate three requirements engineering methods (KAOS, STS and SEPP) in the context of network security, our evaluation methodology can be instantiated in other contexts and other methods.


Sign in / Sign up

Export Citation Format

Share Document