论文标题
一种有效的方法,用于审查Web应用程序敏捷需求规范中与安全有关的方面
An Efficient Approach for Reviewing Security-Related Aspects in Agile Requirements Specifications of Web Applications
论文作者
论文摘要
需求规格的缺陷在软件开发生命周期期间可能会产生严重的后果。其中一些可能导致产品质量和/或由于不正确或缺少质量特征(例如安全性)而导致的时间和预算超支。这种特征需要在Web应用程序中特别关注,因为它们已成为操纵合理数据的目标。几个问题使安全难以处理。例如,由于缺乏安全专业知识,并且在软件开发的早期阶段对安全性的强调,通常会被误解和不当指定。这通常会导致未指定或不确定的安全相关方面。在敏捷环境中,通常会产生轻量级文档,这些问题变得更加具有挑战性。为了解决这个问题,我们设计了一种方法,用于审查Web应用程序敏捷需求规范中与安全有关的方面。我们的建议将用户故事和安全规范视为输入,并通过自然语言处理将这些用户故事与安全属性联系起来。基于相关的安全属性,我们的方法确定了要验证的开放Web应用程序安全项目(OWASP)的高级安全要求,并生成一种阅读技术来支持审阅者检测缺陷。我们通过针对56位新手软件工程师进行的三项实验试验评估我们的方法,衡量有效性,效率,有用性和易用性。我们将我们的方法与使用:(1)OWASP高级安全要求,以及(2)在当代艺术状态中提出的基于透视的方法。结果加强了我们的信心,即使用我们的方法对检查员的效率和效率具有积极影响(效果大小)。
Defects in requirements specifications can have severe consequences during the software development lifecycle. Some of them may result in poor product quality and/or time and budget overruns due to incorrect or missing quality characteristics, such as security. This characteristic requires special attention in web applications because they have become a target for manipulating sensible data. Several concerns make security difficult to deal with. For instance, security requirements are often misunderstood and improperly specified due to lack of security expertise and emphasis on security during early stages of software development. This often leads to unspecified or ill-defined security-related aspects. These concerns become even more challenging in agile contexts, where lightweight documentation is typically produced. To tackle this problem, we designed an approach for reviewing security-related aspects in agile requirements specifications of web applications. Our proposal considers user stories and security specifications as inputs and relates those user stories to security properties via Natural Language Processing. Based on the related security properties, our approach identifies high-level security requirements from the Open Web Application Security Project (OWASP) to be verified, and generates a reading technique to support reviewers in detecting defects. We evaluate our approach via three experiment trials conducted with 56 novice software engineers, measuring effectiveness, efficiency, usefulness, and ease of use. We compare our approach against using: (1) the OWASP high-level security requirements, and (2) a perspective-based approach as proposed in contemporary state of the art. The results strengthen our confidence that using our approach has a positive impact (with large effect size) on the performance of inspectors in terms of effectiveness and efficiency.