A Formal Methods Approach to Security Requirements Specification and Verification

被引:8
|
作者
Rouland, Quentin [1 ]
Hamid, Brahim [1 ]
Bodeveix, Jean-Paul [1 ]
Filali, Mamoun [1 ]
机构
[1] Univ Toulouse, IRIT, 118 Route Narbonne, F-31062 Toulouse 9, France
关键词
Engineering secure systems; Security properties; Formal methods; Metamodel; MODEL;
D O I
10.1109/ICECCS.2019.00033
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The specification and the verification of security requirements is one of the major computer-based systems challenges. Security requirements need to be precisely specified before a tool can manipulate them, and though several approaches to security requirements specification have been proposed, they do not provide the scalability and flexibility required in practice. We take this problem towards an integrated approach for security requirement specification and treatment during the software architecture design time. The general idea of the approach is to: (1) specify security requirements as properties of a modeled system in a technology-independent specification language; (2) implement the developed model in a suitable language with tool support for requirement satisfaction through model verification; and (3) suggest a set of security policies to constrain the operation of the system and to guarantee the security properties. In the scope of this paper, we use first-order logic as a formalism that is abstract and technology-independent and Alloy as a tooled language used in modeling and software development. To validate our work, we explore a set of representative security properties from categories based on CIA classification in the context of secure component-based software architecture development.
引用
收藏
页码:236 / 241
页数:6
相关论文
共 50 条
  • [1] A review on security requirements specification by formal methods
    Mishra, Aditya Dev
    Mustafa, Khurram
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (05):
  • [2] Security requirements specification by formal methods: a research metadata analysis
    Mishra, Aditya Dev
    Mustafa, Khurram
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (14) : 41847 - 41866
  • [3] Security requirements specification by formal methods: a research metadata analysis
    Aditya Dev Mishra
    Khurram Mustafa
    [J]. Multimedia Tools and Applications, 2024, 83 : 41847 - 41866
  • [4] Formal Specification and Verification of Security Guidelines
    Zhioua, Zeineb
    Roudier, Yves
    Ameur, Rabea Boulifa
    [J]. 2017 IEEE 22ND PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2017), 2017, : 267 - 273
  • [5] Tools for formal specification, verification, and validation of requirements
    Heitmeyer, C
    Kirby, J
    Labaw, B
    [J]. COMPASS '97 - ARE WE MAKING PROGRESS TOWARDS COMPUTER ASSURANCE?, 1997, : 35 - 47
  • [6] Security Requirements Specification: A Formal Method Perspective
    Mishra, Aditya Dev
    Mustafa, K.
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM-2020), 2019, : 113 - 117
  • [7] A generic approach to the formal specification of requirements
    Peper, C
    Gotzhein, R
    Kronenburg, M
    [J]. FIRST IEEE INTERNATIONAL CONFERENCE ON FORMAL ENGINEERING METHODS, PROCEEDINGS, 1997, : 252 - 261
  • [8] A formal requirements engineering method for specification, synthesis, and verification
    vonderBeeck, M
    Margaria, T
    Steffen, B
    [J]. 8TH CONFERENCE ON SOFTWARE ENGINEERING ENVIRONMENTS - PROCEEDINGS, 1997, : 131 - 144
  • [9] An Approach for Interoperability Requirements Specification and Verification
    Mallck, Sihem
    Daclin, Nicolas
    Chapurlat, Vincent
    [J]. ENTERPRISE INTEROPERABILITY, 2011, 76 : 89 - 102
  • [10] A Formal Specification and Verification Framework for Timed Security Protocols
    Li, Li
    Sun, Jun
    Liu, Yang
    Sun, Meng
    Dong, Jin-Song
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2018, 44 (08) : 725 - 746