A TECHNIQUE TO INCLUDE COMPUTER SECURITY, SAFETY, AND RESILIENCE REQUIREMENTS AS PART OF THE REQUIREMENTS SPECIFICATION

被引:5
|
作者
MOSTERT, DNJ
VONSOLMS, SH
机构
[1] Rand Afrikaans University, Department of Computer Science, Johannesburg
关键词
D O I
10.1016/0164-1212(94)00086-3
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Provisions to ensure computer security, safety, and resilience are often implemented only after a system has been developed. This leaves many potential risks that must be accounted for at huge costs at a later stage. This article takes computer security, safety, and resilience to the beginning of the systems development life cycle: the user requirement specification. Limited reference was found in the literature on how to determine the requirements for computer security, safety, and resilience. This article proposes a technique for identifying and specifying computer security, safety, and resilience requirements and including these as part of the requirement specification. By use of this technique, a complete set of computer security, safety, and resilience requirements can be identified and specified as early as possible during the development phase. This technique is based on the definition of a requirements matrix by a constraints engineer. The importance of the different computer security, safety, and resilience requirements will be rated in relation to the functional requirements, and applicable counter measures will be allocated. This will lead to justifiable costs for implementing computer security, safety, and resilience for applicable systems. The complete set of computer security, safety, and resilience requirements can be used as a reference after implementation of the system to determine whether all the computer security, safety, and resilience requirements have been accounted for.
引用
收藏
页码:45 / 53
页数:9
相关论文
共 50 条
  • [31] Access Control and Security Properties Requirements Specification for Clouds' SecLAs
    Guesmi, Asma
    Clemente, Patrice
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 723 - 729
  • [32] A Tool-based Semantic Framework for Security Requirements Specification
    Daramola, Olawande
    Sindre, Guttorm
    Moser, Thomas
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2013, 19 (13) : 1940 - 1962
  • [33] Validating Safety and Security Requirements for Partitioned Architectures
    Delange, Julien
    Pautet, Laurent
    Feiler, Petet
    RELIABLE SOFTWARE TECHNOLOGIES - ADA-EUROPE 2009, 2009, 5570 : 30 - +
  • [34] Development of the Safety Requirements Specification (SRS) in oil and gas industry
    Park, E. H.
    Chang, K. P.
    Kim, S. T.
    SAFETY AND RELIABILITY: METHODOLOGY AND APPLICATIONS, 2015, : 467 - 473
  • [35] Translation of safety-critical software requirements specification to Lustre
    Park, Dongchul
    INNOVATIONS AND ADVANCED TECHNIQUES IN COMPUTER AND INFORMATION SCIENCES AND ENGINEERING, 2007, : 157 - 162
  • [36] Visual software requirements specification technique based on communication model
    Ohnishi, A
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2002, E85D (04) : 615 - 622
  • [37] Functional Requirements of Situational Awareness in Computer Network Security
    Onwubiko, Cyril
    ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 209 - 213
  • [38] Security Requirements Specification in Service-oriented Business Process Management
    Menzel, Michael
    Thomas, Ivonne
    Meinel, Christoph
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 41 - 48
  • [39] Aspect-oriented specification of threat-driven security requirements
    Department of Computer Science, North Dakota State University, Fargo, ND 58105, United States
    不详
    不详
    不详
    不详
    不详
    Int J Comput Appl Technol, 2008, 1-2 (131-140):
  • [40] A Mark-Up Language for the Specification of Information Security Governance Requirements
    Sengupta, Anirban
    Mazumdar, Chandan
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2011, 5 (02) : 33 - 53