Eliciting Security Requirements Method Based on Safety Knowledge Base

被引:0
|
作者
Yu, Xiaofei [1 ]
Li, Xiaohong [1 ]
Mang, Qianqian [1 ]
机构
[1] Tianjin Univ, Sch Comp Sci & Technol, Tianjin 300072, Peoples R China
关键词
Security Requirements; Asset; Threat; Security Functional Component; Common Criteria;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of software technology, software security is receiving more and more attention. Security requirement is a key stage in the process of software development. In the present research, we propose a method to elicit security requirements; that is developed based on safety knowledge base. In the method, we perform analysis based on the asset, threat and Common Criteria security function components. Then, we summarize the relationship of the three. Based on this, we establish a safety knowledge base. Starting from the functional requirements of the application system, the system assets will be analyzed and matched automatically based on the established safety knowledge base, and finally we elicit the security requirements. The approach is very effective for the purpose of security requirement analysis, and elicits security requirements easily and efficiently. It will be very helpful for security software development.
引用
收藏
页码:109 / 121
页数:13
相关论文
共 50 条
  • [21] Security & Safety by Model-based Requirements Engineering
    Japs, Sergej
    2020 28TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE'20), 2020, : 422 - 427
  • [22] Logic-based methodology to help security architects in eliciting high-level network security requirements
    Laborde, Romain
    Bulusu, Sravani Teja
    Wazan, Ahmad Samer
    Barrere, Francois
    Benzekri, Abdelmalek
    SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 1610 - 1619
  • [23] Eliciting a Security Architecture Requirements Baseline from Standards and Regulations
    Rouland, Quentin
    Gjorcheski, Stojanche
    Jaskolka, Jason
    2023 IEEE 31ST INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS, REW, 2023, : 224 - 229
  • [24] A Systems Approach for Eliciting Mission-Centric Security Requirements
    Carter, Bryan T.
    Bakirtzis, Georgios
    Elks, Carl R.
    Fleming, Cody H.
    12TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON2018), 2018, : 626 - 633
  • [25] The integration of safety and security requirements
    Eames, DP
    Moffett, J
    COMPUTER SAFETY, RELIABILITY AND SECURITY, 1999, 1698 : 468 - 480
  • [26] CRITICAL DECISION METHOD FOR ELICITING KNOWLEDGE
    KLEIN, GA
    CALDERWOOD, R
    MACGREGOR, D
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1989, 19 (03): : 462 - 472
  • [27] Toward Development Framework for Eliciting and Documenting Knowledge in Requirements Elicitation
    Al-Alsheikh, Halah A.
    Alsalamah, Hessah A.
    Mirza, Abdulrahman A.
    FIRST INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR COMPUTATIONAL INTELLIGENCE, 2020, 1045 : 11 - 20
  • [28] A Community Knowledge Base for IT Security
    Fenz, Stefan
    Parkin, Simon
    van Moorsel, Aad
    IT PROFESSIONAL, 2011, 13 (03) : 24 - 30
  • [29] A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements
    Argyropoulos, Nikolaos
    Shei, Shaun
    Kalloniatis, Christos
    Mouratidis, Haralambos
    Delaney, Aidan
    Fish, Andrew
    Gritzalis, Stefanos
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 4827 - 4836