Integrating Security Patterns with Security Requirements Analysis Using Contextual Goal Models

被引:0
|
作者
Li, Tong [1 ]
Horkoff, Jennifer [1 ]
Mylopoulos, John [1 ]
机构
[1] Univ Trento, Trento, Italy
关键词
Security Patterns; Security Requirements Analysis; Contextual Goal Model; SOCIOTECHNICAL SYSTEMS; METHODOLOGY; TROPOS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security patterns capture proven security knowledge to help analysts tackle security problems. Although advanced research in this field has produced an impressive collection of patterns, they are not widely applied in practice. In parallel, Requirements Engineering has been increasing focusing on security-specific issues, arguing for an up-front treatment of security in system design. However, the vast body of security patterns are not integrated with existing proposals for security requirements analysis, making them difficult to apply as part of early system analysis and design. In this paper, we propose to integrate security patterns with our previously introduced goal-oriented security requirements analysis approach. Specifically, we provide a full concept mapping between textual security patterns and contextual goal models, as well as systematic instructions for constructing contextual goal models from security patterns. Moreover, we propose a systematic process for selecting and applying security patterns, illustrated with a realistic smart grid scenario. To facilitate the practical adoption of security patterns, we have created contextual goal models for 20 security patterns documented in the literature, and have implemented a prototype tool to support our proposal.
引用
收藏
页码:208 / 223
页数:16
相关论文
共 50 条
  • [41] Using Malware Analysis to Improve Security Requirements on Future Systems
    Mead, Nancy R.
    Morales, Jose Andre
    2014 IEEE 1ST WORKSHOP ON EVOLVING SECURITY AND PRIVACY REQUIREMENTS ENGINEERING (ESPRE), 2014, : 37 - 41
  • [42] A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
    Elahi, Golnaz
    Yu, Eric
    Zannone, Nicola
    CONCEPTUAL MODELING - ER 2009, PROCEEDINGS, 2009, 5829 : 99 - +
  • [43] Using contextual security policies for threat response
    Debar, Herve
    Thomas, Yohann
    Boulahia-Cuppens, Nora
    Cuppens, Frederic
    DETECTION OF INTRUSIONS AND MALWARE & VULNERABILITY ASSESSMENT, PROCEEDINGS, 2006, 4064 : 109 - 128
  • [44] Using trust assumptions with security requirements
    Haley, CB
    Laney, RC
    Moffett, JD
    Nuseibeh, B
    REQUIREMENTS ENGINEERING, 2006, 11 (02) : 138 - 151
  • [45] Using trust assumptions with security requirements
    Charles B. Haley
    Robin C. Laney
    Jonathan D. Moffett
    Bashar Nuseibeh
    Requirements Engineering, 2006, 11 : 138 - 151
  • [46] Survey and analysis on Security Requirements Engineering
    Salini, P.
    Kanmani, S.
    COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (06) : 1785 - 1797
  • [47] Hazard analysis for security protocol requirements
    Foster, N
    Jacob, J
    ADVANCES IN NETWORK AND DISTRIBUTED SYSTEMS SECURITY, 2001, 78 : 75 - 92
  • [48] From risk analysis to security requirements
    Gerber, M
    von Solms, R
    COMPUTERS & SECURITY, 2001, 20 (07) : 577 - 584
  • [49] Quantum Cryptography - The Analysis of Security Requirements
    Niemiec, Marcin
    ICTON: 2009 11TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOLS 1 AND 2, 2009, : 814 - 817
  • [50] The ISDF Framework: Integrating Security Patterns and Best Practices
    Alkussayer, Abdulaziz
    Allen, William H.
    ADVANCES IN INFORMATION SECURITY AND ITS APPLICATION, 2009, 36 : 17 - 28