A TECHNIQUE TO INCLUDE COMPUTER SECURITY, SAFETY, AND RESILIENCE REQUIREMENTS AS PART OF THE REQUIREMENTS SPECIFICATION

被引:5
|
作者
MOSTERT, DNJ
VONSOLMS, SH
机构
[1] Rand Afrikaans University, Department of Computer Science, Johannesburg
关键词
D O I
10.1016/0164-1212(94)00086-3
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Provisions to ensure computer security, safety, and resilience are often implemented only after a system has been developed. This leaves many potential risks that must be accounted for at huge costs at a later stage. This article takes computer security, safety, and resilience to the beginning of the systems development life cycle: the user requirement specification. Limited reference was found in the literature on how to determine the requirements for computer security, safety, and resilience. This article proposes a technique for identifying and specifying computer security, safety, and resilience requirements and including these as part of the requirement specification. By use of this technique, a complete set of computer security, safety, and resilience requirements can be identified and specified as early as possible during the development phase. This technique is based on the definition of a requirements matrix by a constraints engineer. The importance of the different computer security, safety, and resilience requirements will be rated in relation to the functional requirements, and applicable counter measures will be allocated. This will lead to justifiable costs for implementing computer security, safety, and resilience for applicable systems. The complete set of computer security, safety, and resilience requirements can be used as a reference after implementation of the system to determine whether all the computer security, safety, and resilience requirements have been accounted for.
引用
收藏
页码:45 / 53
页数:9
相关论文
共 50 条
  • [1] A METHODOLOGY TO INCLUDE COMPUTER SECURITY, SAFETY AND RESILIENCE REQUIREMENTS AS PART OF THE USER REQUIREMENT
    MOSTERT, DNJ
    VONSOLMS, SH
    COMPUTERS & SECURITY, 1994, 13 (04) : 349 - 364
  • [2] Verifying Security Requirements using Model Checking Technique for UML-Based Requirements Specification
    Aoki, Yoshitaka
    Matsuura, Saeko
    2014 IEEE 1ST INTERNATIONAL WORKSHOP ON REQUIREMENTS ENGINEERING AND TESTING (RET), 2014, : 18 - 25
  • [3] Duration calculus in the specification of safety requirements
    Veloudis, S
    Nissanke, N
    FORMAL TECHNIQUES IN REAL-TIME AND FAULT-TOLERANT SYSTEMS, 1998, 1486 : 103 - 112
  • [4] Safety assessment and the software requirements specification
    Broomfield, EJ
    Chung, PWH
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 1997, 55 (03) : 295 - 309
  • [5] Software requirements specification and system safety
    Heimdahl, MPE
    Reese, JD
    RE '97 - PROCEEDINGS OF THE THIRD IEEE INTERNATIONAL SYMPOSIUM ON REQUIREMENTS ENGINEERING, 1997, : 264 - 264
  • [6] Security Requirements Specification: A Formal Method Perspective
    Mishra, Aditya Dev
    Mustafa, K.
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM-2020), 2019, : 113 - 117
  • [7] The integration of safety and security requirements
    Eames, DP
    Moffett, J
    COMPUTER SAFETY, RELIABILITY AND SECURITY, 1999, 1698 : 468 - 480
  • [8] A review on security requirements specification by formal methods
    Mishra, Aditya Dev
    Mustafa, Khurram
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (05):
  • [9] Specification of safety and reliability requirements for control systems
    Motus, Leo
    1996, Oxford Univ Press, Oxford, United Kingdom (01):
  • [10] Safety requirements specification on open distributed systems
    Avelino, VF
    Melnikoff, SSS
    SERP'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2004, : 320 - 326