dc.contributor | Universidad EAFIT. Departamento de Ingeniería de Sistemas | |
dc.contributor | I+D+I en Tecnologías de la Información y las Comunicaciones | |
dc.creator | Souag A. | |
dc.creator | Mazo R. | |
dc.creator | Salinesi C. | |
dc.creator | Comyn-Wattiau I. | |
dc.creator | Souag A. | |
dc.creator | Mazo R. | |
dc.creator | Salinesi C. | |
dc.creator | Comyn-Wattiau I. | |
dc.date.accessioned | 2021-04-12T20:55:47Z | |
dc.date.available | 2021-04-12T20:55:47Z | |
dc.date.created | 2021-04-12T20:55:47Z | |
dc.date.issued | 2018-11-01 | |
dc.identifier | 09473602 | |
dc.identifier | 1432010X | |
dc.identifier | WOS;000444417400006 | |
dc.identifier | SCOPUS;2-s2.0-85029753034 | |
dc.identifier | http://hdl.handle.net/10784/28616 | |
dc.identifier | 10.1007/s00766-017-0279-5 | |
dc.description.abstract | Security requirements are known to be “the most difficult of requirements types” and potentially the ones causing the greatest risk if they are not correct. One approach to requirements elicitation is based on the reuse of explicit knowledge. AMAN-DA is a requirement elicitation method that reuses encapsulated knowledge in security and domain ontologies to produce security requirements specifications. The main research question addressed in this paper is to what extent is AMAN-DA able to generate domain-specific security requirements? Following a well-documented process, a case study related to the maritime domain was undertaken with the goal to demonstrate the utility and effectiveness of AMAN-DA for the elicitation and analysis of domain-specific security requirements. The usefulness of the method was also evaluated with a group of 12 experts. The paper demonstrates the elicitation of domain-specific security requirements by presenting the AMAN-DA method and its application. It describes the evaluation and reports some significant results and their implications for practice and future research, especially for the field of knowledge reuse in requirements engineering. © 2017, Springer-Verlag London Ltd. | |
dc.language | eng | |
dc.publisher | London : Springer-Verlag | |
dc.relation | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85029753034&doi=10.1007%2fs00766-017-0279-5&partnerID=40&md5=4e3c2be3c008fa2efe12234d8751cb4b | |
dc.relation | DOI;10.1007/s00766-017-0279-5 | |
dc.relation | WOS;000444417400006 | |
dc.relation | SCOPUS;2-s2.0-85029753034 | |
dc.rights | https://v2.sherpa.ac.uk/id/publication/issn/0947-3602 | |
dc.source | REQUIREMENTS ENGINEERING | |
dc.subject | Cryptography | |
dc.subject | Ontology | |
dc.subject | Requirements engineering | |
dc.subject | Domain | |
dc.subject | Domain ontologies | |
dc.subject | Explicit knowledge | |
dc.subject | Requirement elicitation | |
dc.subject | Requirements elicitation | |
dc.subject | Research questions | |
dc.subject | Security | |
dc.subject | Security requirements | |
dc.subject | Knowledge management | |
dc.title | Using the AMAN-DA method to generate security requirements: a case study in the maritime domain | |
dc.type | info:eu-repo/semantics/article | |
dc.type | article | |
dc.type | info:eu-repo/semantics/publishedVersion | |
dc.type | publishedVersion | |