Security requirements engineering: A framework for representation and analysis

被引:219
|
作者
Haley, Charles B. [1 ]
Laney, Robin [1 ]
Moffett, Jonathan D. [1 ]
Nuseibeh, Bashar [1 ]
机构
[1] Open Univ, Ctr Res Comp, Dept Comp, Milton Keynes MK7 6AA, Bucks, England
基金
英国工程与自然科学研究理事会;
关键词
requirements engineering; security engineering; security requirements; argumentation;
D O I
10.1109/TSE.2007.70754
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requirements as constraints, and developing satisfaction arguments for the security requirements. The system context is described using a problem-oriented notation, then is validated against the security requirements through construction of a satisfaction argument. The satisfaction argument consists of two parts: a formal argument that the system can meet its security requirements and a structured informal argument supporting the assumptions expressed in the formal argument. The construction of the satisfaction argument may fail, revealing either that the security requirement cannot be satisfied in the context or that the context does not contain sufficient information to develop the argument. In this case, designers and architects are asked to provide additional, design information to resolve the problems. We evaluate the framework by applying it to a security requirements analysis within an air traffic control technology evaluation project.
引用
下载
收藏
页码:133 / 153
页数:21
相关论文
共 50 条
  • [31] Visualising privacy and security for requirements engineering
    Kreeger, MN
    Duncan, I
    SERP'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2004, : 813 - 819
  • [32] A pattern system for security requirements engineering
    Hatebur, Denis
    Heisel, Maritta
    Schmidt, Holger
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 356 - +
  • [33] A systematic review of security requirements engineering
    Mellado, Daniel
    Blanco, Carlos
    Sanchez, Luis E.
    Fernandez-Medina, Eduardo
    COMPUTER STANDARDS & INTERFACES, 2010, 32 (04) : 153 - 165
  • [34] A comparison of security requirements engineering methods
    Benjamin Fabian
    Seda Gürses
    Maritta Heisel
    Thomas Santen
    Holger Schmidt
    Requirements Engineering, 2010, 15 : 7 - 40
  • [35] Research on Security Requirements Engineering Process
    Wang, Hui
    Jia, Zongpu
    Shen, Zihao
    2009 IEEE 16TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2009, : 1285 - 1288
  • [36] A Review of Security Requirements Engineering Methods with Respect to Risk Analysis and Model-Driven Engineering
    Munante, Denisse
    Chiprianov, Vanea
    Gallon, Laurent
    Aniorte, Philippe
    AVAILABILITY, RELIABILITY, AND SECURITY IN INFORMATION SYSTEMS, 2014, 8708 : 79 - 93
  • [37] Security Requirements Engineering (SRE) Framework for Cyber-Physical Systems (CPS): SRE for CPS
    ur Rehman, Shafiq
    Gruhn, Volker
    NEW TRENDS IN INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2017, 297 : 153 - 163
  • [38] A Framework for Simulation of Requirements Engineering Processes
    Host, Martin
    Regnell, Bjorn
    Tingstrom, Christofer
    PROCEEDINGS OF THE 34TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS, 2008, : 183 - +
  • [39] The Requirements Entropy Framework in Systems Engineering
    Grenn, Michael W.
    Sarkani, Shahram
    Mazzuchi, Thomas
    SYSTEMS ENGINEERING, 2014, 17 (04) : 462 - 478
  • [40] A Similarity Measurement Framework for Requirements Engineering
    Ilyas, Muhammad
    Kueng, Josef
    2009 FOURTH INTERNATIONAL MULTI-CONFERENCE ON COMPUTING IN THE GLOBAL INFORMATION TECHNOLOGY (ICCGI 2009), 2009, : 31 - 34