A TECHNIQUE TO INCLUDE COMPUTER SECURITY, SAFETY, AND RESILIENCE REQUIREMENTS AS PART OF THE REQUIREMENTS SPECIFICATION

被引:5
|
作者
MOSTERT, DNJ
VONSOLMS, SH
机构
[1] Rand Afrikaans University, Department of Computer Science, Johannesburg
关键词
D O I
10.1016/0164-1212(94)00086-3
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Provisions to ensure computer security, safety, and resilience are often implemented only after a system has been developed. This leaves many potential risks that must be accounted for at huge costs at a later stage. This article takes computer security, safety, and resilience to the beginning of the systems development life cycle: the user requirement specification. Limited reference was found in the literature on how to determine the requirements for computer security, safety, and resilience. This article proposes a technique for identifying and specifying computer security, safety, and resilience requirements and including these as part of the requirement specification. By use of this technique, a complete set of computer security, safety, and resilience requirements can be identified and specified as early as possible during the development phase. This technique is based on the definition of a requirements matrix by a constraints engineer. The importance of the different computer security, safety, and resilience requirements will be rated in relation to the functional requirements, and applicable counter measures will be allocated. This will lead to justifiable costs for implementing computer security, safety, and resilience for applicable systems. The complete set of computer security, safety, and resilience requirements can be used as a reference after implementation of the system to determine whether all the computer security, safety, and resilience requirements have been accounted for.
引用
收藏
页码:45 / 53
页数:9
相关论文
共 50 条
  • [21] SYNTHESIZING A SPECIFICATION-BASED MONITOR FOR SAFETY REQUIREMENTS
    Babamir, S. M.
    Jalili, S.
    IRANIAN JOURNAL OF SCIENCE AND TECHNOLOGY TRANSACTION B-ENGINEERING, 2010, 34 (B3): : 235 - 256
  • [22] KNOWLEDGE BASED MDA REQUIREMENTS SPECIFICATION AND VALIDATION TECHNIQUE
    Lopata, Audrius
    Ambraziunas, Martas
    Gudas, Saulius
    TRANSFORMATIONS IN BUSINESS & ECONOMICS, 2012, 11 (01): : 248 - 260
  • [23] DOES COMPUTER SECURITY MEET PRIVACY REQUIREMENTS
    ELLISON, R
    INFORMATION PRIVACY, 1978, 1 (01): : 33 - 37
  • [24] Legal requirements for Computer Security: An American perspective
    Banisar, DA
    PERSONAL MEDICAL INFORMATION: SECURITY, ENGINEERING, AND ETHICS, 1997, : 207 - 207
  • [25] An effective technique for the software requirements analysis of NPP safety-critical systems, based on software inspection, requirements traceability, and formal specification
    Koo, SR
    Seong, PH
    Yoo, J
    Cha, SD
    Yoo, YJ
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2005, 89 (03) : 248 - 260
  • [26] UML-SR: A Novel Security Requirements Specification Language
    Mohsin, Muhammad
    Khan, Muhammad Umair
    2019 IEEE 19TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2019), 2019, : 342 - 349
  • [27] FORMAL SPECIFICATION OF SECURITY REQUIREMENTS USING THE THEORY OF NORMATIVE POSITIONS
    JONES, AJI
    SERGOT, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 648 : 103 - 121
  • [28] Requirements specification of a Cloud Service for Cyber Security Compliance Analysis
    Furfaro, Angelo
    Gallo, Teresa
    Garro, Alfredo
    Sacca, Domenico
    Tundis, Andrea
    2016 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2016, : 205 - 212
  • [29] Security requirements specification by formal methods: a research metadata analysis
    Aditya Dev Mishra
    Khurram Mustafa
    Multimedia Tools and Applications, 2024, 83 : 41847 - 41866
  • [30] Security requirements specification by formal methods: a research metadata analysis
    Mishra, Aditya Dev
    Mustafa, Khurram
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (14) : 41847 - 41866