
Vulnerability Database) (OSF, 2015) to determine 
threats related to security requirements mentioned on 
our abuse case diagram.  
To carry out the intention “Mitigate Domain 
Security Risks” we choose DREAD method (Meier et 
al., 2003) to evaluate risks.   
Finally, to perform “Design domain” intention, we 
modeled our reference architecture.  
6  CONCLUSIONS 
The principle aim of this work is to propose 
guidelines for developers using Secure SOPL 
(Achour et al., 2015). We are based on Map 
formalism which permits to orient the developer for 
using security methods, concepts, standards and 
frameworks (such as RMF, STRIDE and Common 
Criteria) all well suited for given situations and 
contexts. This work aims to ensure the development 
of a product (based on SOA) by taking advantages of 
three concepts contributions: a large-scale reuse 
system (product line engineering), service-oriented 
architecture and software security. We presented an 
illustrative example related to a range of 
governmental services offered by the Tunisian 
Ministry of the interior and local development to 
show the feasibility of our proposal. Our perspectives 
are first to provide a tool which supports Secure 
SOPL. Second, we would like to validate the 
proposed approach in different contexts such as e-
commerce, e-learning, etc. 
REFERENCES 
Achour, I., Labed, L., Ben Ghezala, H., 2014. Toward an 
Extended Tool for Analysis of Extended Feature 
Models, In: the International Symposium on Network, 
Computer and Communications ISNCC'14. 
Hammamet, Tunisia.  
Achour, I., Labed, L., Ben Ghezala, H., 2015. Proposition 
of Secure Service Oriented Product Line, In: the 6th 
International Conference on Information Systems and 
Economic IntelligenceSIIE'15. Hammamet, Tunisia. 
Benavides, D., Trinidad, P., Ruiz-cortés, A., 2005. 
Automated Reasoning on Feature Models. LNCS, 
Advanced Information Systems Engineering. In: 17th 
International Conference, CAISE.  
Berger, T., Gunther, S., 2008. Service-Oriented Product 
Lines: Towards a Development Process and Feature 
Management Model for Web Services, In: 12th 
International Software Product Line Conference 
(SPLC 2008), Limerick, Ireland.  
Common Criteria for Information Technology Security 
Evaluation Norm ISO 15408 – Part 1: Introduction and 
general model – version 3.1 2009.  
Common Criteria for Information Technology Security 
Evaluation Norm ISO 15408 – Part 2: Security 
functional requirements– version 3.1, 2009.  
Common Criteria for Information Technology Security 
Evaluation Norm ISO 15408 – Part 3: Security 
assurance requirements– version 3.1, 2009.  
De Win, B., Scandariato, R., Buyens, K., Grégoire, J., 
Joosen, W., 2009.  On the secure software development 
process: CLASP, SDL and Touchpoints compared. 
Information and Software Technology, Vol. 51, No. 7, 
pp. 1152-1171.  
Essafi, M., 2014. Approche multi-démarches avec guidage 
flexible pour le développement de logiciels sécurisés, 
Thesis, Manouba University.   
Essafi, M., Labed L., Ben Ghezala, H., 2007. S2D-ProM: 
A Strategy Oriented Process Model for Secure 
Software Development, In : the second International 
Conference on Software Engineering Advances (ICSEA 
2007), Cap Esterel, French Riviera, France.  
Finkelstein, A., Kramer, J., Nuseibeh, B., 1994. Software 
Process Modelling and Technology, Advanced 
Software Development Series, Research Studies 
Press/John Wiley &Sons..  
Howard, M., 2008. Microsoft Corporation: Fundamental 
practices for secure software development, Stacy 
Simpson, SAFECode.  
Kang, K., Cohen, S., Hess, J., Novak, W., Peterson, S., 
1990.  Feature-Oriented Domain Analysis (FODA) 
Feasibility Study. Technical report CMU/SEI-90-TR-
21, Software Engineering Institute, Carnegie Mellon 
University, Pittsburgh.  
Krakowiak, S., Coupaye, T., Quema, V., Seinturier, L., 
Stefani, J., 2007. Intergiciel et Construction 
d’Applications Réparties.  
Lipner, S., 2004. The Trustworthy Computing Security 
Development Lifecycle, Computer Security 
Applications Conference, 20th Annual Publication, 
ISSN: 1063-9527, ISBN: 0-7695-2252-1, pages 2-13.  
McDermott, J., Fox, C., 1999. Using Abuse Case Models 
for Security Requirements Analysis, In: 15th Annual 
Computer Security Applications Conference, Phoenix, 
Arizona.  
McGraw, G., 2004. Software Security: Building Security, 
In. IEEE Computer Society, IEEE Security and 
Privacy. 
Mead, N. R., Hough, E. D., Stehney, T. R., 2005. Security 
Quality Requirements Engineering (SQUARE) 
Methodology, Technical report CMU/SEI-2005-TR-
009, Carnegie Mellon University.  
Medeiros, F., Romero, S., Santana, E., 2009. Towards an 
Approach for Service-Oriented Product Line 
Architectures. In: 13th International Software Product 
Line Conference (SPLC 2009), San Fransisco, CA, 
USA.  
Meier, J. D., Mackman, A., Vasireddy,  S., Dunner, M., 
Escamilla, R., Murukan, A., 2003. Improving Web 
Application Security: Threats and Countermeasures. 
Microsoft Corporation.  
FormalizationofSecureServiceOrientedProductLine
99