Managing Security Control Assumptions using Causal Traceability

被引:2
|
作者
Nhlabatsi, Armstrong [1 ]
Yu, Yijun [2 ]
Zisman, Andrea [2 ]
Tun, Thein [2 ]
Khan, Niamul [1 ]
Bandara, Arosha [2 ]
Khan, Khaled M. [1 ]
Nuseibeh, Bashar [2 ,3 ]
机构
[1] Qatar Univ, KINDI Lab, Dept Comp Sci & Engn, Doha, Qatar
[2] Open Univ, Dept Comp & Commun, Milton Keynes, Bucks, England
[3] Univ Limerick, Lero, Dublin, Ireland
关键词
Traceability; Assumptions; Security; REQUIREMENTS; EVOLUTION;
D O I
10.1109/SST.2015.14
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions about the operational environment often reveal unexpected flaws. To diagnose the causes of violations in security requirements it is necessary to check these design-time assumptions. Otherwise, the system could be vulnerable to potential attacks. Addressing such vulnerabilities requires an explicit understanding of how the security control specifications were defined from the original security requirements. However, assumptions are rarely explicitly documented and monitored during system operation. This paper proposes a systematic approach to monitoring design-time assumptions explicitly as logs, by using traceability links from requirements to specifications. The work also helps identify which alternative specifications of security control can be used to satisfy a security requirement that has been violated based on the logs. The work is illustrated by an example of an electronic patient record system.
引用
收藏
页码:43 / 49
页数:7
相关论文
共 50 条
  • [41] Disentangling causality: assumptions in causal discovery and inference
    Maarten C. Vonk
    Ninoslav Malekovic
    Thomas Bäck
    Anna V. Kononova
    Artificial Intelligence Review, 2023, 56 : 10613 - 10649
  • [42] Multiple mediators, causal assumptions and potential caveats
    Bone, Jeffrey N.
    Ananth, Cande V.
    PAEDIATRIC AND PERINATAL EPIDEMIOLOGY, 2024, 38 (04) : 313 - 315
  • [43] Traceability for Adaptive Information Security in the Cloud
    Nhlabatsi, A.
    Tun, T.
    Khan, N.
    Yu, Y.
    Bandara, A.
    Khan, K.
    Nuseibehu, B.
    2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 958 - 959
  • [44] Proximal causal inference without uniqueness assumptions
    Zhang, Jeffrey
    Li, Wei
    Miao, Wang
    Tchetgen, Eric Tchetgen
    STATISTICS & PROBABILITY LETTERS, 2023, 198
  • [45] Causal Graphs and Concept-Mapping Assumptions
    Levine, Eli
    Butler, J. S.
    APPLIED SYSTEM INNOVATION, 2018, 1 (03) : 1 - 10
  • [46] Theory, research design assumptions, and causal inferences
    Armstrong, Christopher S.
    Kepler, John D.
    JOURNAL OF ACCOUNTING & ECONOMICS, 2018, 66 (2-3): : 366 - 373
  • [47] ANALYTICAL ASSUMPTIONS AND CAUSAL ORDERING IN INTERINDUSTRY MODELING
    CRONIN, FJ
    SOUTHERN ECONOMIC JOURNAL, 1984, 51 (02) : 521 - 529
  • [48] Typing assumptions improve identification in causal discovery
    Brouillard, Philippe
    Taslakian, Perouz
    Lacoste, Alexandre
    Lachapelle, Sebastien
    Drouin, Alexandre
    CONFERENCE ON CAUSAL LEARNING AND REASONING, VOL 177, 2022, 177
  • [49] Research on Food Security Traceability System
    He Xuechen
    Cao Zhen
    2011 SECOND ETP/IITA CONFERENCE ON TELECOMMUNICATION AND INFORMATION (TEIN 2011), VOL 2, 2011, : 103 - 105
  • [50] How temporal assumptions influence causal judgments
    Hagmayer, Y
    Waldmann, MR
    MEMORY & COGNITION, 2002, 30 (07) : 1128 - 1137