Managing Security Control Assumptions using Causal Traceability

被引:2
|
作者
Nhlabatsi, Armstrong [1 ]
Yu, Yijun [2 ]
Zisman, Andrea [2 ]
Tun, Thein [2 ]
Khan, Niamul [1 ]
Bandara, Arosha [2 ]
Khan, Khaled M. [1 ]
Nuseibeh, Bashar [2 ,3 ]
机构
[1] Qatar Univ, KINDI Lab, Dept Comp Sci & Engn, Doha, Qatar
[2] Open Univ, Dept Comp & Commun, Milton Keynes, Bucks, England
[3] Univ Limerick, Lero, Dublin, Ireland
关键词
Traceability; Assumptions; Security; REQUIREMENTS; EVOLUTION;
D O I
10.1109/SST.2015.14
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions about the operational environment often reveal unexpected flaws. To diagnose the causes of violations in security requirements it is necessary to check these design-time assumptions. Otherwise, the system could be vulnerable to potential attacks. Addressing such vulnerabilities requires an explicit understanding of how the security control specifications were defined from the original security requirements. However, assumptions are rarely explicitly documented and monitored during system operation. This paper proposes a systematic approach to monitoring design-time assumptions explicitly as logs, by using traceability links from requirements to specifications. The work also helps identify which alternative specifications of security control can be used to satisfy a security requirement that has been violated based on the logs. The work is illustrated by an example of an electronic patient record system.
引用
收藏
页码:43 / 49
页数:7
相关论文
共 50 条
  • [1] Managing food security using blockchain-enabled traceability system
    Gupta, Rachita
    Shankar, Ravi
    BENCHMARKING-AN INTERNATIONAL JOURNAL, 2024, 31 (01) : 53 - 74
  • [2] A map traceability management scheme for security control
    Fang, Liguo
    Fu, Zhengxin
    Yi, Cheng
    Zhang, Yong
    ENTERPRISE INFORMATION SYSTEMS, 2020, 14 (03) : 388 - 401
  • [3] Using trust assumptions with security requirements
    Charles B. Haley
    Robin C. Laney
    Jonathan D. Moffett
    Bashar Nuseibeh
    Requirements Engineering, 2006, 11 : 138 - 151
  • [4] Using trust assumptions with security requirements
    Haley, CB
    Laney, RC
    Moffett, JD
    Nuseibeh, B
    REQUIREMENTS ENGINEERING, 2006, 11 (02) : 138 - 151
  • [5] Modeling of Security and Stability Control for Power Systems Using Causal Analysis
    Fan, Youping
    Wu, Lihui
    Nie, Zhicheng
    Liu, Songkai
    PROCEEDINGS OF THE 28TH CHINESE CONTROL AND DECISION CONFERENCE (2016 CCDC), 2016, : 6109 - 6114
  • [6] Managing food traceability information using EPCIS framework
    Thakur, Maitri
    Sorensen, Carl-Fredrik
    Bjornson, Finn Olav
    Foras, Eskil
    Hurburgh, Charles R.
    JOURNAL OF FOOD ENGINEERING, 2011, 103 (04) : 417 - 433
  • [7] Causal assumptions and causal inference in ecological experiments
    Kimmel, Kaitlin
    Dee, Laura E.
    Avolio, Meghan L.
    Ferraro, Paul J.
    TRENDS IN ECOLOGY & EVOLUTION, 2021, 36 (12) : 1141 - 1152
  • [8] Enhancing Security in the Cloud: when Traceability meets Access Control
    Bertolissi, Clara
    Boucelma, Omar
    Uttha, Worachet
    2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 365 - 366
  • [9] Efficiency, security, traceability
    PPI Pulp Pap Int, 2006, 5 (29-32):
  • [10] Managing the process of passenger security control at an airport using the fuzzy inference system
    Skorupski, Jacek
    Uchronski, Piotr
    EXPERT SYSTEMS WITH APPLICATIONS, 2016, 54 : 284 - 293