Integrating Security Patterns with Security Requirements Analysis Using Contextual Goal Models

被引:0
|
作者
Li, Tong [1 ]
Horkoff, Jennifer [1 ]
Mylopoulos, John [1 ]
机构
[1] Univ Trento, Trento, Italy
关键词
Security Patterns; Security Requirements Analysis; Contextual Goal Model; SOCIOTECHNICAL SYSTEMS; METHODOLOGY; TROPOS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security patterns capture proven security knowledge to help analysts tackle security problems. Although advanced research in this field has produced an impressive collection of patterns, they are not widely applied in practice. In parallel, Requirements Engineering has been increasing focusing on security-specific issues, arguing for an up-front treatment of security in system design. However, the vast body of security patterns are not integrated with existing proposals for security requirements analysis, making them difficult to apply as part of early system analysis and design. In this paper, we propose to integrate security patterns with our previously introduced goal-oriented security requirements analysis approach. Specifically, we provide a full concept mapping between textual security patterns and contextual goal models, as well as systematic instructions for constructing contextual goal models from security patterns. Moreover, we propose a systematic process for selecting and applying security patterns, illustrated with a realistic smart grid scenario. To facilitate the practical adoption of security patterns, we have created contextual goal models for 20 security patterns documented in the literature, and have implemented a prototype tool to support our proposal.
引用
收藏
页码:208 / 223
页数:16
相关论文
共 50 条
  • [1] Using Security and Domain ontologies for Security Requirements Analysis
    Souag, Amina
    Salinesi, Camille
    Wattiau, Isabelle
    Mouratidis, Haris
    2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW), 2013, : 101 - 107
  • [2] Selecting Security Patterns that Fulfill Security Requirements
    Weiss, M.
    Mouratidis, H.
    PROCEEDINGS OF THE 16TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, 2008, : 169 - +
  • [3] Decision-Making in Security Requirements Engineering with Constrained Goal Models
    Argyropoulos, Nikolaos
    Angelopoulos, Konstantinos
    Mouratidis, Haralambos
    Fish, Andrew
    COMPUTER SECURITY, 2017, 2018, 10683 : 262 - 280
  • [4] Relating Security Requirements and Design Patterns Reducing Security Requirements implementation impacts with Design Patterns
    Ferraz, Felipe Silva
    Assad, Rodrigo Elia
    Lemos Meira, Silvio Romero
    2009 FOURTH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING ADVANCES (ICSEA 2009), 2009, : 9 - 14
  • [5] Formal analysis and design for engineering security automated derivation of formal software security specifications from goal-oriented security requirements
    Hassan, R.
    Eltoweissy, M.
    Bohner, S.
    El-Kassas, S.
    IET SOFTWARE, 2010, 4 (02) : 149 - 160
  • [6] Security Requirements Analysis Using Knowledge in CAPEC
    Kaiya, Haruhiko
    Kono, Sho
    Ogata, Shinpei
    Okubo, Takao
    Yoshioka, Nobukazu
    Washizaki, Hironori
    Kaijiri, Kenji
    ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS, 2014, 178 : 343 - 348
  • [7] Integrating security and usability into the requirements and design process
    Flechais, Ivan
    Mascolo, Cecilia
    Sasse, M. Angela
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2007, 1 (01) : 12 - 26
  • [8] Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns
    Matulevicius, Raimundas
    Ahmed, Naved
    IT-INFORMATION TECHNOLOGY, 2013, 55 (06): : 225 - 230
  • [9] Managing Security Requirements Patterns using Feature Diagram Hierarchies
    Slavin, Rocky
    Lehker, Jean-Michel
    Niu, Jianwei
    Breaux, Travis D.
    2014 IEEE 22ND INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2014, : 193 - 202
  • [10] Security requirements for civil aviation with UML and goal orientation
    Darimont, Robert
    Lemoine, Michel
    Requirements Engineering: Foundation for Software Quality, 2007, 4542 : 292 - 299