aspects is the fact that this proposal integrates other approaches, such as SIREN [19],
UMLSec [17], security use cases [6] or misuse cases [18]. And it is also compatible
with WSSecReq (Web Services Security Requirements) stage of the PWSSec (Web
Services Security Development Process) process [7], as well as SREP might incorpo-
rate into its SRR the catalogue of security requirements template for web services
based on SIREN, which Gutierrez et al. propose in [8].
Further work is also needed to provide a CARE (Computer-Aided Requirements
Engineering) tool which supports the process, as well as a refinement of the theoreti-
cal approach by proving it with a real case study.
Acknowledgements
This paper has been produced in the context of the DIMENSIONS (PBC-05-012-2)
Project of the Consejería de Ciencia y Tecnología de la Junta de Comunidades de
Castilla- La Mancha along with FEDER and the CALIPO (TIC2003-07804-CO5-03)
and RETISTIC (TIC2002-12487-E) projects of the Dirección General de
Investigación del Ministerio de Ciencia y Tecnología.
References
1. Baskeville, R., The development duality of information systems security. Journal of Man-
agement Systems, 1992. 4(1): p. 1-12.
2. Breu, R. and Innerhofer–Oberperfler, F., Model based business driven IT security analysis.
2005: SREIS 2005.
3. Cybulsky, J. and Reed, K., Requirements Classification and Reuse: Crossing Domains
Boundaries. ICSR'2000, 2000: p. 190-210.
4. Fernández-Medina, E., Moya, R., and Piattini Velthus, M., Gestión de Requisitos de
Seguridad, in Seguridad de las Tecnologías de la Información "La construcción de la
confianza para una sociedad conectada", AENOR, Editor. 2003. p. pp 593-618.
5. Firesmith, D.G., Engineering Security Requirements. Journal of Object Technology, 2003.
2(1): p. 53-68.
6. Firesmith, D.G., Security Use Cases. 2003: Journal of Object Technology. p. 53-64.
7. Gutierrez, C., Fernández-Medina, E., and Piattini, M., PWSSec: Process for Web Services
Security. IEEE ICWS'05, 2005.
8. Gutiérrez, C., Moros, B., Toval, A., Fernández-Medina, E., and Piattini, M., Security Re-
quirements for Web Services based on SIREN. Symposium on Requirements Engineering
for Information Security (SREIS-2005), together with the 13th IEEE International Re-
quirements Engineering Conference – RE’05, 2005.
9. Kam, S.H., Integrating the Common Criteria Into the Software Engineering Lifecycle.
IDEAS'05, 2005: p. 267-273.
10. Kim., H.-K., Automatic Translation Form Requirements Model into Use Cases Modeling
on UML. ICCSA 2005, 2005: p. 769-777.
11. Kotonya, G. and Sommerville, I., Requirements Engineering Process and Techniques.
Hardcover ed. 1998. 294.
12. McDermott, J. and Fox, C. Using Abuse Case Models for Security Requirements Analysis.
in Annual Computer Security Applications Conference. 1999. Phoenix, Arizona.
144