Analyzing and Enforcing Security Mechanisms on Requirements Specifications

被引:2
|
作者
Li, Tong [1 ]
Horkoff, Jennifer [1 ]
Mylopoulos, John [1 ]
机构
[1] Univ Trento, Trento, Italy
关键词
D O I
10.1007/978-3-319-16101-3_8
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
[Context and motivation] Security mechanisms, such as firewalls and encryption, operationalize security requirements, such as confidentiality and integrity. [Question/problem] Although previous work has pointed out that the application of a security mechanism affects system specifications, there is no systematic approach to describe and analyze this impact. [Principal ideas/results] In this paper, we investigate more than 40 security mechanisms that are well documented in security pattern repositories in order to better understand what they are and how they function. [Contribution] Based on this study, we propose a conceptual model for security mechanisms, and evaluate this model against 20 security mechanisms. Using the conceptual model, we provide a systematic process for analyzing and enforcing security mechanisms on system requirements. We also develop a prototype tool to facilitate the application and evaluation of our approach.
引用
收藏
页码:115 / 131
页数:17
相关论文
共 50 条
  • [41] Formal analysis and design for engineering security automated derivation of formal software security specifications from goal-oriented security requirements
    Hassan, R.
    Eltoweissy, M.
    Bohner, S.
    El-Kassas, S.
    IET SOFTWARE, 2010, 4 (02) : 149 - 160
  • [42] A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities
    Golnaz Elahi
    Eric Yu
    Nicola Zannone
    Requirements Engineering, 2010, 15 : 41 - 62
  • [43] Improving the Quality of Requirements in Middleware Requirements Specifications
    Uddagiri, Vidyasagar
    Eswarachary, Lingachary
    Jagadeesan, Manigandan
    Kharat, Vishal
    2020 28TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE'20), 2020, : 412 - 415
  • [44] A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities
    Elahi, Golnaz
    Yu, Eric
    Zannone, Nicola
    REQUIREMENTS ENGINEERING, 2010, 15 (01) : 41 - 62
  • [45] Security on MASS with XML security specifications
    Oliveira, Emerson
    Abdelouahab, Zair
    Lopes, Denivaldo
    SEVENTEENTH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2006, : 5 - +
  • [46] Security protocols and specifications
    Abadi, M
    FOUNDATIONS OF SOFTWARE SCIENCE AND COMPUTATION STRUCTURES, 1999, 1578 : 1 - 13
  • [47] Enforcing security in smart homes using security patterns
    Khoury, Paul El
    Busnel, Pierre
    Giroux, Sylvain
    Li, Keqin
    International Journal of Smart Home, 2009, 3 (02): : 57 - 70
  • [48] Integrated personal health record (PHR) security: requirements and mechanisms
    Hosseini, Azamossadat
    Emami, Hassan
    Sadat, Yousef
    Paydar, Somayeh
    BMC MEDICAL INFORMATICS AND DECISION MAKING, 2023, 23 (01)
  • [49] A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept
    Langer, Lucie
    Schmidt, Axel
    Buchmann, Johannes
    Volkamer, Melanie
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 475 - 480
  • [50] Bayesian Mechanisms and Learning for Wireless Networks Security with QoS Requirements
    Chorppath, Anil Kumar
    Shen, Fei
    Alpcan, Tansu
    Jorswieck, Eduard
    Boche, Holger
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 7180 - 7185