Analyzing and Enforcing Security Mechanisms on Requirements Specifications

被引:2
|
作者
Li, Tong [1 ]
Horkoff, Jennifer [1 ]
Mylopoulos, John [1 ]
机构
[1] Univ Trento, Trento, Italy
关键词
D O I
10.1007/978-3-319-16101-3_8
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
[Context and motivation] Security mechanisms, such as firewalls and encryption, operationalize security requirements, such as confidentiality and integrity. [Question/problem] Although previous work has pointed out that the application of a security mechanism affects system specifications, there is no systematic approach to describe and analyze this impact. [Principal ideas/results] In this paper, we investigate more than 40 security mechanisms that are well documented in security pattern repositories in order to better understand what they are and how they function. [Contribution] Based on this study, we propose a conceptual model for security mechanisms, and evaluate this model against 20 security mechanisms. Using the conceptual model, we provide a systematic process for analyzing and enforcing security mechanisms on system requirements. We also develop a prototype tool to facilitate the application and evaluation of our approach.
引用
收藏
页码:115 / 131
页数:17
相关论文
共 50 条
  • [31] Goal-oriented, B-based formal derivation of security design specifications from security requirements
    Hassan, Riham
    Bohner, Shawn
    El-Kassas, Sherif
    Eltoweissy, Mohamed
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1443 - +
  • [32] On providing and enforcing basic security
    Mahler, Vincent A.
    AMERICAN BEHAVIORAL SCIENTIST, 2008, 51 (09) : 1370 - 1373
  • [33] OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements
    Lamp, Josephine
    Rubio-Medrano, Carlos E.
    Zhao, Ziming
    Ahn, Gail-Joon
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 1 - 10
  • [34] Enforcing messaging security policies
    Likavec, J
    Wolthusen, SD
    THIRD IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2005, : 131 - 138
  • [35] SECURITY FORCES - ENFORCING ACCOUNTABILITY
    不详
    ECONOMIC AND POLITICAL WEEKLY, 1994, 29 (53) : 3296 - 3296
  • [36] Enforcing Security Policies on Programs
    Ould-Slimane, Hakima
    Mejri, Mohamed
    Adi, Kamel
    NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2006, 147 : 195 - +
  • [37] Enforcing Architectural Security Decisions
    Jasser, Stefanie
    IEEE 17TH INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE (ICSA 2020), 2020, : 35 - 45
  • [38] An Approach for Reviewing Security-Related Aspects in Agile Requirements Specifications of Web Applications
    Villamizar, Hugo
    Anderlin Neto, Amadeu
    Kalinowski, Marcos
    Garcia, Alessandro
    Mendez, Daniel
    2019 27TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2019), 2019, : 86 - 97
  • [39] A Formal Technique for Concurrent Generation of Software's Functional and Security Requirements in SOFL Specifications
    Emeka, Busalire
    Liu, Shaoying
    STRUCTURED OBJECT-ORIENTED FORMAL LANGUAGE AND METHOD (SOFL+MSVL 2019), 2020, 12028 : 13 - 28
  • [40] An Investigation on Open-RAN Specifications: Use Cases, Security Threats, Requirements, Discussions
    Park, Heejae
    Nguyen, Tri-Hai
    Park, Laihyuk
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 141 (01): : 13 - 41