Argumentation-Based Security Requirements Elicitation: The Next Round

被引:0
|
作者
Ionita, Dan [1 ]
Bullee, Jan-Willem [1 ]
Wieringa, Roel J. [1 ]
机构
[1] Univ Twente, Serv Cybersecur & Safety Res Grp, NL-7500 AE Enschede, Netherlands
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Information Security Risk Assessment can be viewed as part of requirements engineering because it is used to translate security goals into security requirements, where security requirements are the desired system properties that mitigate threats to security goals. To improve the defensibility of these mitigations, several researchers have attempted to base risk assessment on argumentation structures. However, none of these approaches have so far been scalable or usable in real-world risk assessments. In this paper, we present the results from our search for a scalable argumentation-based information security RA method. We start from previous work on both formal argumentation frameworks and informal argument structuring and try to find a promising middle ground. An initial prototype using spreadsheets is validated and iteratively improved via several Case Studies. Challenges such as scalability, quantify-ability, ease of use, and relation to existing work in parallel fields are discussed. Finally, we explore the scope and applicability of our approach with regard to various classes of Information Systems while also drawing more general conclusions on the role of argumentation in security.
引用
收藏
页码:7 / 12
页数:6
相关论文
共 50 条
  • [41] Legal Facts in Argumentation-Based Litigation Games
    Minghui Xiong
    Frank Zenker
    [J]. Argumentation, 2018, 32 : 197 - 211
  • [42] An Argumentation-Based Dialog for Social Evaluations Exchange
    Pinyol, Isaac
    Sabater-Mir, Jordi
    [J]. ECAI 2010 - 19TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2010, 215 : 997 - +
  • [43] Security requirements elicitation via weaving scenarios based on security evaluation criteria
    Itoga, Hiroya
    Ohnishi, Atsushi
    [J]. USIC 2007: PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, 2007, : 70 - 79
  • [44] Problem-based Elicitation of Security Requirements The ProCOR Method
    Wirtz, Roman
    Heisel, Maritta
    Meis, Rene
    Omerovic, Aida
    Stolen, Ketil
    [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, 2018, : 26 - 38
  • [45] Problem-Based Security Requirements Elicitation and Refinement with PresSuRE
    Fassbender, Stephan
    Heisel, Maritta
    Meis, Rene
    [J]. SOFTWARE TECHNOLOGIES, ICSOFT 2014, 2015, 555 : 311 - 330
  • [46] An Ontology Based Collaborative Recommender System for Security Requirements Elicitation
    Williams, Imano
    [J]. 2018 IEEE 26TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2018), 2018, : 448 - 453
  • [47] Argumentation-Based Defeasible Reasoning For Existential Rules
    Hecham, Abdelraouf
    Croitoru, Madalina
    Bisquert, Pierre
    [J]. AAMAS'17: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS AND MULTIAGENT SYSTEMS, 2017, : 1568 - 1569
  • [48] Engineering Explainable Agents: An Argumentation-Based Approach
    Panisson, Alison R.
    Engelmann, Debora C.
    Bordini, Rafael H.
    [J]. ENGINEERING MULTI-AGENT SYSTEMS, 2022, 13190 : 273 - 291
  • [49] Argumentation-Based Preference Modelling with Incomplete Information
    Visser, Wietske
    Hindriks, Koen V.
    Jonker, Catholijn M.
    [J]. COMPUTATIONAL LOGIC IN MULTI-AGENT SYSTEMS, 2010, 6214 : 141 - 157
  • [50] An Argumentation-Based Perspective Over the Social IoT
    Lippi, Marco
    Mamei, Marco
    Mariani, Stefano
    Zambonelli, Franco
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 2537 - 2547