Integrating Security Patterns with Security Requirements Analysis Using Contextual Goal Models

被引:0
|
作者
Li, Tong [1 ]
Horkoff, Jennifer [1 ]
Mylopoulos, John [1 ]
机构
[1] Univ Trento, Trento, Italy
关键词
Security Patterns; Security Requirements Analysis; Contextual Goal Model; SOCIOTECHNICAL SYSTEMS; METHODOLOGY; TROPOS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security patterns capture proven security knowledge to help analysts tackle security problems. Although advanced research in this field has produced an impressive collection of patterns, they are not widely applied in practice. In parallel, Requirements Engineering has been increasing focusing on security-specific issues, arguing for an up-front treatment of security in system design. However, the vast body of security patterns are not integrated with existing proposals for security requirements analysis, making them difficult to apply as part of early system analysis and design. In this paper, we propose to integrate security patterns with our previously introduced goal-oriented security requirements analysis approach. Specifically, we provide a full concept mapping between textual security patterns and contextual goal models, as well as systematic instructions for constructing contextual goal models from security patterns. Moreover, we propose a systematic process for selecting and applying security patterns, illustrated with a realistic smart grid scenario. To facilitate the practical adoption of security patterns, we have created contextual goal models for 20 security patterns documented in the literature, and have implemented a prototype tool to support our proposal.
引用
收藏
页码:208 / 223
页数:16
相关论文
共 50 条
  • [21] Integrating functional and security requirements with use case decomposition
    Pauli, Josh
    Xu, Dianxiang
    ICECCS 2006: 11TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2006, : 57 - +
  • [22] Integrating Security Requirements Engineering into MBSE: Profile and Guidelines
    Mazeika, D.
    Butleris, R.
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [23] Integrating safety and security requirements into design of an embedded system
    Zafar, S
    Dromey, RG
    12th Asia-Pacific Software Engineering Conference, Proceedings, 2005, : 629 - 636
  • [24] Security Attack Analysis Using Attack Patterns
    Li, Tong
    Paja, Elda
    Mylopoulos, John
    Horkoff, Jennifer
    Beckers, Kristian
    2016 IEEE TENTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2016, : 513 - 525
  • [25] Integrating security patterns into the electronic invoicing process
    Netter, Michael
    Pernul, Guenther
    PROCEEDINGS OF THE 20TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATION, 2009, : 150 - 154
  • [26] Framework for Engineering Complex Security Requirements Patterns
    Mazo, Raul
    Feltus, Christophe
    2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 250 - 254
  • [27] Goal-Oriented Security Requirements Analysis for a System Used in Several Different Activities
    Kaiya, Haruhiko
    Okubo, Takao
    Kanaya, Nobuyuki
    Suzuki, Yuji
    Ogata, Shinpei
    Kaijiri, Kenji
    Yoshioka, Nobukazu
    ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS (CAISE), 2013, 148 : 478 - 489
  • [28] Modeling telemedicine security requirements using a SysML security extension
    Maskani, Ilham
    Boutahar, Jaouad
    El Houssaini, Souhail El Ghazi
    PROCEEDINGS OF 2018 6TH INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2018, : 77 - 82
  • [29] Integrating Heterogeneous Security Knowledge Sources for Comprehensive Security Analysis
    Wang, Guodi
    Li, Tong
    Yue, Hao
    Yang, Zhen
    Zhang, Runzi
    2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021), 2021, : 714 - 724
  • [30] Identification of Security Requirements in Systems of Systems by Functional Security Analysis
    Fuchs, Andreas
    Rieke, Roland
    ARCHITECTING DEPENDABLE SYSTEMS VII, 2010, 6420 : 74 - 96