Eliciting Security Requirements Method Based on Safety Knowledge Base

被引:0
|
作者
Yu, Xiaofei [1 ]
Li, Xiaohong [1 ]
Mang, Qianqian [1 ]
机构
[1] Tianjin Univ, Sch Comp Sci & Technol, Tianjin 300072, Peoples R China
关键词
Security Requirements; Asset; Threat; Security Functional Component; Common Criteria;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of software technology, software security is receiving more and more attention. Security requirement is a key stage in the process of software development. In the present research, we propose a method to elicit security requirements; that is developed based on safety knowledge base. In the method, we perform analysis based on the asset, threat and Common Criteria security function components. Then, we summarize the relationship of the three. Based on this, we establish a safety knowledge base. Starting from the functional requirements of the application system, the system assets will be analyzed and matched automatically based on the established safety knowledge base, and finally we elicit the security requirements. The approach is very effective for the purpose of security requirement analysis, and elicits security requirements easily and efficiently. It will be very helpful for security software development.
引用
收藏
页码:109 / 121
页数:13
相关论文
共 50 条
  • [1] Eliciting security requirements method based on safety knowledge base
    Yu, Xiaofei
    Li, Xiaohong
    Zhang, Qianqian
    Communications in Computer and Information Science, 2013, 332 : 109 - 121
  • [2] Modeling and Utilizing Security Knowledge for Eliciting Security Requirements
    Abe, Tatsuya
    Hayashi, Shinpei
    Saeki, Motoshi
    ADVANCES IN CONCEPTUAL MODELING, ER 2015 WORKSHOPS, 2015, 9382 : 236 - 247
  • [3] Experiences in eliciting security requirements
    CERT, Software Engineering Institute
    不详
    CrossTalk, 2006, 12 (14-19):
  • [4] Eliciting dependability requirements: A knowledge-based approach
    Liu, Chun
    Wang, Yue
    Jin, Zhi
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2010, 38 (2A): : 188 - 193
  • [5] Eliciting security requirements with misuse cases
    Guttorm Sindre
    Andreas L. Opdahl
    Requirements Engineering, 2005, 10 : 34 - 44
  • [6] Eliciting security requirements with misuse cases
    Sindre, G
    Opdahl, AL
    REQUIREMENTS ENGINEERING, 2005, 10 (01) : 34 - 44
  • [7] Eliciting Security Requirements - An Experience Report
    Trentinaglia, Roman
    Merschjohann, Sven
    Fockel, Markus
    Eikerling, Hendrik
    REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY, REFSQ 2023, 2023, 13975 : 351 - 365
  • [8] Eliciting security requirements by misuse cases
    Sindre, G
    Opdahl, AL
    37TH INTERNATIONAL CONFERENCE ON TECHNOLOGY OF OBJECT-ORIENTED LANGUAGES AND SYSTEMS, PROCEEDINGS, 2000, : 120 - 143
  • [9] Towards ontological approach to eliciting risk-based security requirements
    Arogundade, Oluwasefunmi Tale
    Jin, Zhi
    Yang, Xiaoguang
    International Journal of Information and Computer Security, 2014, 6 (02) : 143 - 178
  • [10] Eliciting security requirements through misuse activities
    Braz, Fabricio A.
    Ferriandez, Eduardo B.
    VanHilst, Michael
    DEXA 2008: 19TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2008, : 328 - +