An Integrated Model for Software Security Testing Requirements

被引:0
|
作者
Hui, Zhanwei [1 ]
Huang, Song [1 ]
Liu, Xiaoming [1 ]
Rao, Liping [1 ]
机构
[1] PLA Software Test & Evaluat Ctr Mil Training, Nanjing 210007, Jiangsu, Peoples R China
关键词
Software Security testing; Security Adversary testing; Security Use Cases; Misuse Cases;
D O I
10.4028/www.scientific.net/AMM.121-126.1891
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Security requirements engineers usually only need provide with software security requirements, and they unnecessarily specify software security behavior mechanisms, which are critical not only for software security design but also for software security testing. After discussing the relations and differences between security use cases and misuse cases, we provides an integrated model, SETAM, for software security testing requirements, which is based on security function testing use cases and adversary testing use cases..
引用
收藏
页码:1891 / 1895
页数:5
相关论文
共 50 条
  • [21] Analyzing and Evaluating Security Features in Software Requirements
    Malhotra, Ruchika
    Chug, Anuradha
    Hayrapetian, Allenoush
    Raje, Rajeev
    [J]. 2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 26 - 30
  • [22] Security requirements for ubiquitous software development site
    Kim, Tai-hoon
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2006, 4252 : 836 - 843
  • [23] Software Security Requirements Engineering: State of the Art
    Ramachandran, Muthu
    [J]. GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 313 - 322
  • [24] Security requirements variability for software product lines
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1413 - +
  • [25] Requirements for Security Enhancements to Legacy Software with RUP
    Mocanu, Virgil
    [J]. INFORMATION SECURITY JOURNAL, 2010, 19 (04): : 226 - 236
  • [26] Towards security requirements management for software product lines:: A security domain requirements engineering process
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    [J]. COMPUTER STANDARDS & INTERFACES, 2008, 30 (06) : 361 - 371
  • [27] Towards an Integrated Model for Safety and Security Requirements of Cyber-Physical Systems
    Brunner, Michael
    Huber, Michael
    Sauerwein, Clemens
    Breu, Ruth
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2017, : 334 - 340
  • [28] Effectiveness and performance analysis of model-oriented security requirements engineering to elicit security requirements: a systematic solution for developing secure software systems
    Salini, P.
    Kanmani, S.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (03) : 319 - 334
  • [29] Effectiveness and performance analysis of model-oriented security requirements engineering to elicit security requirements: a systematic solution for developing secure software systems
    P. Salini
    S. Kanmani
    [J]. International Journal of Information Security, 2016, 15 : 319 - 334
  • [30] Security Guarantees for Automated Software Testing
    Liyanage, Danushka
    [J]. PROCEEDINGS OF THE 29TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '21), 2021, : 1610 - 1614