Access protection is an important requirement for systems, which handle confidential data. This paper describes an approach for the requirements engineering of an access protection using the example of an open system. A major problem of open systems is that many users with different roles access it. Moreover, the open system is connected to the Internet and has ports for connecting hardware like an external storage medium. Therefore, it is easy to steal or misuse confidential data from open systems if access protection is not existent. First, we used Task and Object-Oriented Requirements Engineering (TORE) in order to specify functional requirements on the access protection. For the elicitation of non-functional requirements, we applied Misuse-Oriented Quality Requirements Engineering (MOQARE), on which this paper is focused. Furthermore, we used the German IT-Safety and Security Standard Handbook in order to ensure the completeness of the solution requirements. For consideration of architectural requirements, we used Integrated Conflict Resolution and Architectural Design (ICRAD). It allows to analyze which design can realize which requirements and therefore to identify the most suitable one. Combining these three requirements engineering methods ensured a complete and appropriate solution.
[1]
L OpdahlAndreas,et al.
Eliciting security requirements with misuse cases
,
2005
.
[2]
Andreas L. Opdahl,et al.
Eliciting security requirements with misuse cases
,
2004,
Requirements Engineering.
[3]
A. Herrmann,et al.
Requirements Prioritization Based on Benefit and Cost Prediction: An Agenda for Future Research
,
2008,
2008 16th IEEE International Requirements Engineering Conference.
[4]
Barbara Paech,et al.
Task-Driven Requirements in Object-Oriented Development
,
2004
.
[5]
Barbara Paech,et al.
Icrad: an Integrated Process for the Solution of Requirements Conflicts and Architectural Design
,
2006,
Int. J. Softw. Eng. Knowl. Eng..
[6]
Barbara Paech,et al.
MOQARE: misuse-oriented quality requirements engineering
,
2008,
Requirements Engineering.
[7]
Haralambos Mouratidis,et al.
Secure Tropos: a Security-Oriented Extension of the Tropos Methodology
,
2007,
Int. J. Softw. Eng. Knowl. Eng..
[8]
Bashar Nuseibeh,et al.
Security Requirements Engineering: A Framework for Representation and Analysis
,
2008,
IEEE Transactions on Software Engineering.