UML based Security Function Policy Verification Method for Requirements Specification

被引:1
|
作者
Noro, Atsushi [1 ]
Matsuura, Saeko [1 ]
机构
[1] Shibaura Inst Technol, Grad Sch Engn, Div Elect Engn & Comp Sci, Minuma Ku, Saitama 3378570, Japan
关键词
Commmon Criteria; Model Checking; Security; Requirements; Verification; UML;
D O I
10.1109/COMPSAC.2013.141
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
One key to success for high quality systems developments is to verify not only functional requirements but also the security requirements at the early stage of developments. However, it is difficult for general developers who have only less security knowledge to define verifiable requirements specification without leakages and errors. To reduce these some leakages or errors, this paper proposes a UML- based security requirements verification method using the security knowledge of Common Criteria.
引用
收藏
页码:832 / 833
页数:2
相关论文
共 50 条
  • [1] Verification of UML-based security policy model
    Park, SC
    Kwon, G
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 3, 2005, 3482 : 973 - 982
  • [2] Verifying Security Requirements using Model Checking Technique for UML-Based Requirements Specification
    Aoki, Yoshitaka
    Matsuura, Saeko
    [J]. 2014 IEEE 1ST INTERNATIONAL WORKSHOP ON REQUIREMENTS ENGINEERING AND TESTING (RET), 2014, : 18 - 25
  • [3] UML-SR: A Novel Security Requirements Specification Language
    Mohsin, Muhammad
    Khan, Muhammad Umair
    [J]. 2019 IEEE 19TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2019), 2019, : 342 - 349
  • [4] Verification method of security model based on UML and model checking
    Cheng, Liang
    Zhang, Yang
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (04): : 699 - 708
  • [5] A Formal Methods Approach to Security Requirements Specification and Verification
    Rouland, Quentin
    Hamid, Brahim
    Bodeveix, Jean-Paul
    Filali, Mamoun
    [J]. 2019 24TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2019), 2019, : 236 - 241
  • [6] An Extended UML Method for the Verification of Security Protocols
    Shen, Gang
    Li, Xiaohong
    Feng, Ruitao
    Xu, Guangquan
    Hu, Jing
    Feng, Zhiyong
    [J]. 2014 19TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2014), 2014, : 19 - 28
  • [7] Security Software Formal Modeling and Verification Method Based on UML and Z
    Cao, Kunyu
    Li, Xiaohong
    Xing, Jinliang
    [J]. CONTEMPORARY RESEARCH ON E-BUSINESS TECHNOLOGY AND STRATEGY, 2012, 332 : 390 - 401
  • [8] Security software formal modeling and verification method based on UML and Z
    [J]. Cao, K. (kunyucao@tju.edu.cn), 1600, Springer Verlag (332):
  • [9] Formal Specification and Verification of Modular Security Policy Based on Colored Petri Nets
    Huang, Hejiao
    Kirchner, Helene
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (06) : 852 - 865
  • [10] Specification of security constraint in UML
    Fernández-Medina, E
    Piattini, M
    Serrano, MA
    [J]. 35TH ANNUAL 2001 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2001, : 163 - 171