Integrating Security Patterns with Security Requirements Analysis Using Contextual Goal Models

被引:0
|
作者
Li, Tong [1 ]
Horkoff, Jennifer [1 ]
Mylopoulos, John [1 ]
机构
[1] Univ Trento, Trento, Italy
关键词
Security Patterns; Security Requirements Analysis; Contextual Goal Model; SOCIOTECHNICAL SYSTEMS; METHODOLOGY; TROPOS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security patterns capture proven security knowledge to help analysts tackle security problems. Although advanced research in this field has produced an impressive collection of patterns, they are not widely applied in practice. In parallel, Requirements Engineering has been increasing focusing on security-specific issues, arguing for an up-front treatment of security in system design. However, the vast body of security patterns are not integrated with existing proposals for security requirements analysis, making them difficult to apply as part of early system analysis and design. In this paper, we propose to integrate security patterns with our previously introduced goal-oriented security requirements analysis approach. Specifically, we provide a full concept mapping between textual security patterns and contextual goal models, as well as systematic instructions for constructing contextual goal models from security patterns. Moreover, we propose a systematic process for selecting and applying security patterns, illustrated with a realistic smart grid scenario. To facilitate the practical adoption of security patterns, we have created contextual goal models for 20 security patterns documented in the literature, and have implemented a prototype tool to support our proposal.
引用
收藏
页码:208 / 223
页数:16
相关论文
共 50 条
  • [31] Towards scalable security analysis using multi-layered security models
    Hong, Jin B.
    Kim, Dong Seong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 75 : 156 - 168
  • [32] Time Independent Security Analysis for Dynamic Networks using Graphical Security Models
    Enoch, Simon Yusuf
    Hong, Jin B.
    Kim, Dong Seong
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 588 - 595
  • [33] Integrating Security Aspects into Business Process Models
    Brucker, Achim D.
    IT-INFORMATION TECHNOLOGY, 2013, 55 (06): : 239 - 245
  • [34] Automated verification of UMLsec models for security requirements
    Jürjens, J
    Shabalin, P
    UML 2004 - THE UNIFIED MODELING LANGUAGE: MODELING LANGUAGES AND APPLICATIONS, PROCEEDINGS, 2004, 3273 : 365 - 379
  • [35] Designing security requirements models through planning
    Bryl, Volha
    Massacci, Fabio
    Mylopoulos, John
    Zannone, Nicola
    ADVANCED INFORMATION SYSTEMS ENGINEERING, PROCEEDINGS, 2006, 4001 : 33 - 47
  • [36] Enforcing security in smart homes using security patterns
    Khoury, Paul El
    Busnel, Pierre
    Giroux, Sylvain
    Li, Keqin
    International Journal of Smart Home, 2009, 3 (02): : 57 - 70
  • [37] Integrating Goal Models and Problem Frames for Requirements Analysis of Self-adaptive CPS
    Han, Deshuai
    Xing, Jianchun
    Yang, Qiliang
    Li, Juelong
    Zhang, Xiaobing
    Chen, Ying
    2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2017, : 529 - 535
  • [38] Visualising personas as goal models to find security tensions
    Faily, Shamal
    Iacob, Claudia
    Ali, Raian
    Ki-Aries, Duncan
    INFORMATION AND COMPUTER SECURITY, 2021, 29 (05) : 787 - 815
  • [39] Generating Secure Workflow Designs from Requirements Goal Models Using Patterns
    Liaskos, Sotirios
    Jaouhar, Ibrahim
    Danish, Syed Muhammad
    Khan, Shakil M.
    CONCEPTUAL MODELING, ER 2024, 2025, 15238 : 195 - 214
  • [40] Enterprise assets security requirements construction from ESRMG grammar based on security patterns
    Supaporn, Kawin
    Prompoon, Nakornthip
    Rojkangsadan, Thongchai
    14TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2007, : 112 - +