Essec\Faculty\Model\Contribution {#2216
#_index: "academ_contributions"
#_id: "2437"
#_source: array:26 [
"id" => "2437"
"slug" => "reusable-knowledge-in-security-requirements-engineering-a-systematic-mapping-study"
"yearMonth" => "2016-06"
"year" => "2016"
"title" => "Reusable Knowledge in Security Requirements Engineering: A Systematic Mapping Study"
"description" => "SOUAG, A., MAZO, R., SALINESI, C. et WATTIAU, I. (2016). Reusable Knowledge in Security Requirements Engineering: A Systematic Mapping Study. <i>Requirements Engineering</i>, 21(2), pp. 251-283."
"authors" => array:4 [
0 => array:3 [
"name" => "WATTIAU Isabelle"
"bid" => "B00000530"
"slug" => "wattiau-isabelle"
]
1 => array:1 [
"name" => "SOUAG A."
]
2 => array:1 [
"name" => "MAZO R."
]
3 => array:1 [
"name" => "SALINESI C."
]
]
"ouvrage" => ""
"keywords" => []
"updatedAt" => "2021-02-02 16:16:18"
"publicationUrl" => "https://www.researchgate.net/publication/276832001_Reusable_knowledge_in_security_requirements_engineering_a_systematic_mapping_study"
"publicationInfo" => array:3 [
"pages" => "251-283"
"volume" => "21"
"number" => "2"
]
"type" => array:2 [
"fr" => "Articles"
"en" => "Journal articles"
]
"support_type" => array:2 [
"fr" => "Revue scientifique"
"en" => "Scientific journal"
]
"countries" => array:2 [
"fr" => null
"en" => null
]
"abstract" => array:2 [
"fr" => "Security is a concern that must be taken into consideration starting from the early stages of system development. Over the last two decades, researchers and engineers have developed a considerable number of methods for security requirements engineering. Some of them rely on the (re)use of security knowledge. Despite some existing surveys about security requirements engineering, there is not yet any reference for researchers and practitioners that presents in a systematic way the existing proposals, techniques, and tools related to security knowledge reuse in security requirements engineering. The aim of this paper is to fill this gap by looking into drawing a picture of the literature on knowledge and reuse in security requirements engineering. The questions we address are related to methods, techniques, modeling frameworks, and tools for and by reuse in security requirements engineering. We address these questions through a systematic mapping study. The mapping study was a literature review conducted with the goal of identifying, analyzing, and categorizing state-of-the-art research on our topic. This mapping study analyzes more than thirty approaches, covering 20 years of research in security requirements engineering. The contributions can be summarized as follows: (1) A framework was defined for analyzing and comparing the different proposals as well as categorizing future contributions related to knowledge reuse and security requirements engineering; (2) the different forms of knowledge representation and reuse were identified; and (3) previous surveys were updated. We conclude that most methods should introduce more reusable knowledge to manage security requirements."
"en" => "Security is a concern that must be taken into consideration starting from the early stages of system development. Over the last two decades, researchers and engineers have developed a considerable number of methods for security requirements engineering. Some of them rely on the (re)use of security knowledge. Despite some existing surveys about security requirements engineering, there is not yet any reference for researchers and practitioners that presents in a systematic way the existing proposals, techniques, and tools related to security knowledge reuse in security requirements engineering. The aim of this paper is to fill this gap by looking into drawing a picture of the literature on knowledge and reuse in security requirements engineering. The questions we address are related to methods, techniques, modeling frameworks, and tools for and by reuse in security requirements engineering. We address these questions through a systematic mapping study. The mapping study was a literature review conducted with the goal of identifying, analyzing, and categorizing state-of-the-art research on our topic. This mapping study analyzes more than thirty approaches, covering 20 years of research in security requirements engineering. The contributions can be summarized as follows: (1) A framework was defined for analyzing and comparing the different proposals as well as categorizing future contributions related to knowledge reuse and security requirements engineering; (2) the different forms of knowledge representation and reuse were identified; and (3) previous surveys were updated. We conclude that most methods should introduce more reusable knowledge to manage security requirements."
]
"authors_fields" => array:2 [
"fr" => "Systèmes d'Information, Data Analytics et Opérations"
"en" => "Information Systems, Data Analytics and Operations"
]
"indexedAt" => "2024-12-21T16:21:43.000Z"
"docTitle" => "Reusable Knowledge in Security Requirements Engineering: A Systematic Mapping Study"
"docSurtitle" => "Journal articles"
"authorNames" => "<a href="/cv/wattiau-isabelle">WATTIAU Isabelle</a>, SOUAG A., MAZO R., SALINESI C."
"docDescription" => "<span class="document-property-authors">WATTIAU Isabelle, SOUAG A., MAZO R., SALINESI C.</span><br><span class="document-property-authors_fields">Information Systems, Data Analytics and Operations</span> | <span class="document-property-year">2016</span>"
"keywordList" => ""
"docPreview" => "<b>Reusable Knowledge in Security Requirements Engineering: A Systematic Mapping Study</b><br><span>2016-06 | Journal articles </span>"
"docType" => "research"
"publicationLink" => "<a href="https://www.researchgate.net/publication/276832001_Reusable_knowledge_in_security_requirements_engineering_a_systematic_mapping_study" target="_blank">Reusable Knowledge in Security Requirements Engineering: A Systematic Mapping Study</a>"
]
+lang: "en"
+"_type": "_doc"
+"_score": 9.266215
+"parent": null
}