Specifying Security Goals of Component Based Systems : An End-User Perspective

被引:0
|
作者
Khan, Khaled M. [1 ]
Han, Jun [2 ]
机构
[1] Qatar Univ, Dept Comp Sci & Engn, POB 2713, Doha, Qatar
[2] Swinburne Univ Technol, Fac ICT, Hawthorn, Vic 3122, Australia
关键词
D O I
10.1109/ICCBSS.2008.22
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper treats security from a software engineering point of view. Security issues of software components are usually handled at the two levels of development abstractions: by the security experts during the component design, and by the software engineers during the composition of an application system. Security experts identify the threats of the component, define the security policies and functions. On the other hand, the software engineers are more interested in the compositional impact and conformity of the security properties designed and implemented by the security experts. This paper identifies a third level of abstraction: security from the end-users' perspective. This paper argues that the end-users of the system should know the specific security objectives actually achieved at the system-level. This paper makes the following three specific contributions in this regard: (i) a need for a separate view of security at the end-user level; (ii) the formulation of security goals; (iii) the derivation of security goals for automatic processing.
引用
收藏
页码:101 / +
页数:2
相关论文
共 50 条
  • [21] Android on PC: On the Security of End-user Android Emulators
    Xu, Fenghao
    Shen, Siyu
    Diao, Wenrui
    Li, Zhou
    Chen, Yi
    Li, Rui
    Zhang, Kehuan
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 1566 - 1580
  • [22] Extending the End-user Computing Satisfaction with Security Measures
    Putra, Syopiansyah Jaya
    Rosalina, Rosalina
    Subiyakto, A'ang
    Gunawan, Muhamad Nur
    2018 6TH INTERNATIONAL CONFERENCE ON CYBER AND IT SERVICE MANAGEMENT (CITSM), 2018, : 581 - 585
  • [23] The future of eBooks? Will print disappear? An end-user perspective
    van der Velde, Wouter
    Ernst, Olaf
    LIBRARY HI TECH, 2009, 27 (04) : 570 - 583
  • [24] CONSTRUCTING END-USER KNOWLEDGE MANIPULATION SYSTEMS
    EDMONDS, EA
    OBRIEN, SM
    BAYLEY, T
    MCDAID, E
    INTERNATIONAL JOURNAL OF MAN-MACHINE STUDIES, 1993, 38 (01): : 51 - 70
  • [25] End-user class definition in CAD systems
    Texier, G
    Depaulis, F
    Guittet, L
    IEEE SYMPOSIA ON HUMAN-CENTRIC COMPUTING LANGUAGES AND ENVIRONMENTS, PROCEEDINGS, 2001, : 180 - 187
  • [26] Testing and debugging Web applications: An end-user perspective
    Phalgune, A
    2004 IEEE SYMPOSIUM ON VISUAL LANGUAGES AND HUMAN CENTRIC COMPUTING: PROCEEDINGS, 2004, : 289 - 290
  • [27] Designing end-user geographic information systems
    West, LA
    ASSOCIATION FOR INFORMATION SYSTEMS PROCEEDINGS OF THE AMERICAS CONFERENCE ON INFORMATION SYSTEMS, 1998, : 406 - 408
  • [28] End-user feedback in multi-user workflow systems
    Naus, Nico
    Jeuring, Johan
    PROCEEDINGS OF THE 32ND SYMPOSIUM ON IMPLEMENTATION AND APPLICATION OF FUNCTIONAL LANGUAGES, IFL 2020, 2020, : 23 - 32
  • [29] End-User Composition of Graphical User Interfaces for PalCom Systems
    Johnsson, Bjoern A.
    Weibull, Gunnar
    11TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2016) / THE 13TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2016) / AFFILIATED WORKSHOPS, 2016, 94 : 224 - 231
  • [30] End-user computing and information systems methodologies
    Taylor, MJ
    Moynihan, EP
    Wood-Harper, AT
    INFORMATION SYSTEMS JOURNAL, 1998, 8 (01) : 85 - 96