Ontology-driven evolution of software security

被引:9
|
作者
Peldszus, Sven [1 ]
Burger, Jens [2 ]
Kehrer, Timo [3 ]
Jurjens, Jan [1 ,4 ]
机构
[1] Univ Koblenz Landau, Inst Software Technol, Univ Str 1, D-56070 Koblenz, Germany
[2] Knipp Medien & Kommunikat GmbH, Martin Schmeisser Weg 9, D-44227 Dortmund, Germany
[3] Humboldt Univ, Unter Linden 6, D-10099 Berlin, Germany
[4] Fraunhofer Inst Software & Syst Engn ISST, Emil Figge Str 91, D-44227 Dortmund, Germany
基金
欧盟地平线“2020”;
关键词
Software engineering; Model-based security; Security context knowledge; Ontology evolution; Semantic editing patterns; Security compliance; FRAMEWORK;
D O I
10.1016/j.datak.2021.101907
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Ontologies as a means to formally specify the knowledge of a domain of interest have made their way into information and communication technology. Most often, such knowledge is subject to continuous change, which demands for consistent evolution of ontologies and dependent artifacts. In this article, we study ontology evolution in the context of software security, where ontologies may be used to formalize the security context knowledge which is needed to properly implement security requirements. In this application scenario, techniques for detecting ontology changes and determining their semantic impact are required to maintain the security of a software-intensive system in response to changing security context knowledge. Our solution is capable of detecting semantic editing patterns, which may be customly defined using graph transformation rules, but it does not depend on information about editing processes such as persistently managed changelogs. We leverage semantic editing patterns for (i) generating system co-evolution proposals, (ii) adapting the configuration of standard security checks, and (iii) performing incremental security compliance analyses between co-evolved system models and the implementation. We demonstrate the feasibility of the approach using a realistic medical information system known as iTrust.
引用
收藏
页数:25
相关论文
共 50 条
  • [1] An Ontology-Driven Approach to Automating the Process of Integrating Security Software Systems
    Islam, Chadni
    Babar, Muhammad Ali
    Nepal, Surya
    [J]. 2019 IEEE/ACM INTERNATIONAL CONFERENCE ON SOFTWARE AND SYSTEM PROCESSES (ICSSP 2019), 2019, : 54 - 63
  • [2] An Ontology-Driven Software Development Framework
    Mavetera, Nehemiah
    Kroeze, Jan
    [J]. BUSINESS TRANSFORMATION THROUGH INNOVATION AND KNOWLEDGE MANAGEMENT: AN ACADEMIC PERSPECTIVE, VOLS 3 AND 4, 2010, : 1713 - 1724
  • [3] A Software Architecture for Ontology-Driven Situation Awareness
    Baumgartner, Norbert
    Retschitzegger, Werner
    Schwinger, Wieland
    [J]. APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 2326 - +
  • [4] Ontology-Driven Visual Analytics Software Development
    Chuprina, S., I
    Ryabinin, K., V
    Koznov, D., V
    Matkin, K. A.
    [J]. PROGRAMMING AND COMPUTER SOFTWARE, 2022, 48 (03) : 208 - 214
  • [5] An Ontology-Driven Approach Applied to Information Security
    Vorobiev, Artem
    Bekmamedova, Nargiza
    [J]. JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2010, 42 (01): : 61 - 76
  • [6] Ontology-Driven Visual Analytics Software Development
    S. I. Chuprina
    K. V. Ryabinin
    D. V. Koznov
    K. A. Matkin
    [J]. Programming and Computer Software, 2022, 48 : 208 - 214
  • [7] Ontology-driven Security Testing of Web Applications
    Bozic, Josip
    Li, Yihao
    Wotawa, Franz
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE TESTING (AITEST), 2020, : 115 - 122
  • [8] Towards a Comprehensive Ontology-Driven Software Development Approach
    Mavetera, Nehemiah
    [J]. INNOVATION AND KNOWLEDGE MANAGEMENT: A GLOBAL COMPETITIVE ADVANTAGE, VOLS 1-4, 2011, : 393 - 402
  • [9] Ontology-Driven Pattern Selection and Matching in Software Design
    Di Noia, Tommaso
    Mongiello, Marina
    Di Sciascio, Eugenio
    [J]. SOFTWARE ARCHITECTURE, ECSA 2014, 2014, 8627 : 82 - 89
  • [10] Ontology-Driven Security Requirements Recommendation for APT Attack
    Kim, MinJu
    Dey, Sangeeta
    Lee, Seok-Won
    [J]. 2019 IEEE 27TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW 2019), 2019, : 150 - 156