one or more stakeholders that propose it. Another concern is related to the reuse
of requirements, which is tackled by including a catalogue concept. This concept
serves to gather a set of requirements extracted from one or more sources (i.e., a law,
an organization policy, a particular domain,...) and that can be reused in all the projects
in which these sources are applicable. Still another concern is that of vocabulary disam-
biguation. Since requirements are usually described by using natural language, which
can be imprecise and ambiguous, the metamodel considers the possibility of describing
requirements using a set of well-defined terms gathered into a glossary. Finally,
possible methods for assuring the fulfilment of requirements can be modelled through
the concept of Validation Method.
2.2 Extending the Requirements Metamodel with Security Concepts
Once the requirements metamodel of Figure 1 has been defined, the next aim is to ex-
tend it with specific security concepts (see Figure 2). In order to ease the explanation,
we have classified them in several categories: basic security concepts, security require-
ments, and access control methods.
The basic security concepts are: Asset, Threat, Safeguard and Contingency
Plan. These terms have been extracted from MAGERIT [9], which conforms to the
standard ISO/IEC 15408-1999 (also known as the Common Criteria Framework [10]).
An Asset is a physical or logical object that has value itself and deserves to keep
some guarantees over it. Assets can have different types, for instance, documents,
data tables, and so forth, and they are important for a business, which is measured with
an impact index. An Asset can be damaged by a Threat, which has properties such
as its type, frequency (modelled as an annual rate), a concrete success probability and
a degradation (that is, the level of damage caused in an Asset if the threat achieves
its goal). Safeguards serve as a crackdown on a risk in order to reduce it. As shown
in the type attribute, we will distinguish between Safeguard Functions and
Safeguard Measures. The former are actions which reduce the risk whereas the
latter are physical or logical devices or processes that reduce the risk. Two operation
modes are distinguished for the safeguards: preventive if they act before a threat had
taken place and curative if they act on damaged assets. For the sake of softening a
threat that can give rise to damage, a detailed Contingency Plan composed of a
set of safeguards is recommended.
There not exists an standard classification for Security Requirements, so
based on [11, 12], five categories of them have been considered, which tackle five cat-
egories of threats, according to the characteristics that give value to the assets. These
categories are: privacy, integrity, authentication, availability and accountability. Fre-
quently there exist sets of requirements which are related to the same asset, soften the
same attack and achieve the same security objective. This concept, which has been ex-
tracted from [13], is introduced in our metamodel as a Security Requirements
Cluster. Regarding to Privacy and Integrity requirements, they are directly
associated with an Access Control Method which has a validity period. The dif-
ferent methods considered are Permissions (DAC), Security Levels (MAC)
121