Security requirements engineering: A framework for representation and analysis

被引:219
|
作者
Haley, Charles B. [1 ]
Laney, Robin [1 ]
Moffett, Jonathan D. [1 ]
Nuseibeh, Bashar [1 ]
机构
[1] Open Univ, Ctr Res Comp, Dept Comp, Milton Keynes MK7 6AA, Bucks, England
基金
英国工程与自然科学研究理事会;
关键词
requirements engineering; security engineering; security requirements; argumentation;
D O I
10.1109/TSE.2007.70754
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requirements as constraints, and developing satisfaction arguments for the security requirements. The system context is described using a problem-oriented notation, then is validated against the security requirements through construction of a satisfaction argument. The satisfaction argument consists of two parts: a formal argument that the system can meet its security requirements and a structured informal argument supporting the assumptions expressed in the formal argument. The construction of the satisfaction argument may fail, revealing either that the security requirement cannot be satisfied in the context or that the context does not contain sufficient information to develop the argument. In this case, designers and architects are asked to provide additional, design information to resolve the problems. We evaluate the framework by applying it to a security requirements analysis within an air traffic control technology evaluation project.
引用
下载
收藏
页码:133 / 153
页数:21
相关论文
共 50 条
  • [41] A framework for understanding creativity in requirements engineering
    Nguyen, Lemai
    Shanks, Graeme
    INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (03) : 655 - 662
  • [42] Bridging the Requirements Engineering and Business Analysis Toward a Unified Knowledge Framework
    Aoyama, Mikio
    ADVANCES IN CONCEPTUAL MODELING, ER 2016 WORKSHOPS, 2016, 9975 : 149 - 160
  • [43] Electronic voting systems security requirements engineering
    Daimi, K
    Wilson, C
    SERP '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2005, : 230 - 235
  • [44] Experimental Evaluation of Security Requirements Engineering Benefits
    Boutahar, Jaouad
    Maskani, Ilham
    El Ghazi El Houssaini, Souhail
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (11) : 411 - 415
  • [45] Enhancing security requirements engineering by organizational learning
    Kurt Schneider
    Eric Knauss
    Siv Houmb
    Shareeful Islam
    Jan Jürjens
    Requirements Engineering, 2012, 17 : 35 - 56
  • [46] Security Requirements Engineering From TARA to PenTest
    Ebert, Christof
    2019 27TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2019), 2019, : 500 - 501
  • [47] Guest Editorial: Requirements Engineering for Information Security
    Annie I. Antón
    Requirements Engineering, 2002, 7 (4) : 177 - 178
  • [48] A Review on Tool Supports for Security Requirements Engineering
    Yahya, Syazwani
    Kamalrudin, Massila
    Sidek, Safiah
    2013 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS), 2013, : 190 - +
  • [49] Security Requirements Engineering for Secure Business Processes
    Paja, Elda
    Giorgini, Paolo
    Paul, Stephane
    Meland, Per Hakon
    WORKSHOPS ON BUSINESS INFORMATICS RESEARCH, 2012, 106 : 77 - +
  • [50] Security Requirements Engineering Process for Web Applications
    Salini, P.
    Kanmani, S.
    INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 2799 - 2807