An Integrated Model for Software Security Testing Requirements

被引:0
|
作者
Hui, Zhanwei [1 ]
Huang, Song [1 ]
Liu, Xiaoming [1 ]
Rao, Liping [1 ]
机构
[1] PLA Software Test & Evaluat Ctr Mil Training, Nanjing 210007, Jiangsu, Peoples R China
关键词
Software Security testing; Security Adversary testing; Security Use Cases; Misuse Cases;
D O I
10.4028/www.scientific.net/AMM.121-126.1891
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Security requirements engineers usually only need provide with software security requirements, and they unnecessarily specify software security behavior mechanisms, which are critical not only for software security design but also for software security testing. After discussing the relations and differences between security use cases and misuse cases, we provides an integrated model, SETAM, for software security testing requirements, which is based on security function testing use cases and adversary testing use cases..
引用
收藏
页码:1891 / 1895
页数:5
相关论文
共 50 条
  • [1] SETAM: An Integrated Model for Software Security Testing Requirements Behavior
    Hui, Zhanwei
    Huang, Song
    Liu, Xiaoming
    Hu, Bin
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (11A): : 4435 - 4442
  • [2] The security requirements behavior model for trustworthy software
    Saleh, Kassem
    Habil, Maryam
    [J]. 2008 INTERNATIONAL MCETECH CONFERENCE ON E-TECHNOLOGIES, PROCEEDINGS, 2007, : 235 - +
  • [3] Benchmark Requirements for Assessing Software Security Vulnerability Testing Tools
    Parizi, Reza M.
    Qian, Kai
    Shahriar, Hossain
    Wu, Fan
    Tao, Lixin
    [J]. 2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2018, : 825 - 826
  • [4] An approach to analyze software security requirements in ABAC model
    Thanh-Nhan Luong
    Dinh-Hieu Vo
    Ninh-Thuan Truong
    [J]. PROCEEDINGS OF 2019 6TH NATIONAL FOUNDATION FOR SCIENCE AND TECHNOLOGY DEVELOPMENT (NAFOSTED) CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2019, : 184 - 189
  • [5] Comodeling: From Requirements to an Integrated Software/Hardware Model
    Myers, Toby
    Dromey, R. Geoff
    Fritzson, Peter
    [J]. COMPUTER, 2011, 44 (04) : 62 - 70
  • [6] Software Testing Model Study Based on Requirements Change
    Liu, Shuping
    Pang, Ling
    [J]. PROCEEDINGS OF 2008 INTERNATIONAL PRE-OLYMPIC CONGRESS ON COMPUTER SCIENCE, VOL I: COMPUTER SCIENCE AND ENGINEERING, 2008, : 230 - 233
  • [7] Risk-Based Security Requirements Model for Web Software
    Ezenwoye, Onyeka
    Liu, Yi
    [J]. 2022 IEEE 30TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW), 2022, : 232 - 237
  • [8] Security requirements for software development
    Kim, TH
    Shin, MC
    Kim, SH
    Cha, JS
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2004, 3215 : 116 - 122
  • [9] Testing for software security
    Thompson, HH
    Whittaker, JA
    [J]. DR DOBBS JOURNAL, 2002, 27 (11): : 24 - +
  • [10] Software security testing
    Potter, B
    McGraw, G
    [J]. IEEE SECURITY & PRIVACY, 2004, 2 (05) : 81 - 85