Managing Security Control Assumptions using Causal Traceability

被引:2
|
作者
Nhlabatsi, Armstrong [1 ]
Yu, Yijun [2 ]
Zisman, Andrea [2 ]
Tun, Thein [2 ]
Khan, Niamul [1 ]
Bandara, Arosha [2 ]
Khan, Khaled M. [1 ]
Nuseibeh, Bashar [2 ,3 ]
机构
[1] Qatar Univ, KINDI Lab, Dept Comp Sci & Engn, Doha, Qatar
[2] Open Univ, Dept Comp & Commun, Milton Keynes, Bucks, England
[3] Univ Limerick, Lero, Dublin, Ireland
关键词
Traceability; Assumptions; Security; REQUIREMENTS; EVOLUTION;
D O I
10.1109/SST.2015.14
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions about the operational environment often reveal unexpected flaws. To diagnose the causes of violations in security requirements it is necessary to check these design-time assumptions. Otherwise, the system could be vulnerable to potential attacks. Addressing such vulnerabilities requires an explicit understanding of how the security control specifications were defined from the original security requirements. However, assumptions are rarely explicitly documented and monitored during system operation. This paper proposes a systematic approach to monitoring design-time assumptions explicitly as logs, by using traceability links from requirements to specifications. The work also helps identify which alternative specifications of security control can be used to satisfy a security requirement that has been violated based on the logs. The work is illustrated by an example of an electronic patient record system.
引用
收藏
页码:43 / 49
页数:7
相关论文
共 50 条
  • [31] Managing assumptions during agile development
    Ostacchini, Ireo
    Wermelinger, Michel
    2009 ICSE WORKSHOP ON SHARING AND REUSING ARCHITECTURAL KNOWLEDGE, 2009, : 9 - 16
  • [32] An asymmetric traceability scheme for copyright protection without trust assumptions
    Magkos, E
    Kotzanikolaou, P
    Chrissikopoulos, V
    ELECTRONIC COMMERCE AND WEB TECHNOLOGIES, 2001, 2115 : 186 - 195
  • [33] Disentangling causality: assumptions in causal discovery and inference
    Vonk, Maarten C.
    Malekovic, Ninoslav
    Back, Thomas
    Kononova, Anna V.
    ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (09) : 10613 - 10649
  • [34] Causal Mediation Analysis: Warning! Assumptions Ahead
    Keele, Luke
    AMERICAN JOURNAL OF EVALUATION, 2015, 36 (04) : 500 - 513
  • [35] Sufficiency and Necessity Assumptions in Causal Structure Induction
    Mayrhofer, Ralf
    Waldmann, Michael R.
    COGNITIVE SCIENCE, 2016, 40 (08) : 2137 - 2150
  • [36] KNOWLEDGE-BASED ASSUMPTIONS IN CAUSAL ATTRIBUTION
    NOVICK, LR
    FRATIANNE, A
    CHENG, PW
    SOCIAL COGNITION, 1992, 10 (03) : 299 - 333
  • [37] Security for whom? The shifting security assumptions of pervasive computing
    Stajano, F
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 16 - 27
  • [38] How temporal assumptions influence causal judgments
    York Hagmayer
    Michael R. Waldmann
    Memory & Cognition, 2002, 30 : 1128 - 1137
  • [39] THE CAUSAL ASSUMPTIONS OF QUASI-EXPERIMENTAL PRACTICE
    COOK, TD
    CAMPBELL, DT
    SYNTHESE, 1986, 68 (01) : 141 - 180
  • [40] Prior and posterior checking of implicit causal assumptions
    Linero, Antonio R.
    BIOMETRICS, 2023, 79 (04) : 3153 - 3164