Security Requirement Modeling Support System using Software Security Knowledge Base

被引:3
|
作者
Hazeyama, Atsuo [1 ]
Tanaka, Shun'chi [2 ]
Tanaka, Takafumi [3 ]
Hashiura, Hiroaki [4 ]
Munetoh, Seiji [5 ]
Okubo, Takao [6 ]
Kaiya, Haruhiko [7 ]
Washizaki, Hironori [8 ]
Yoshioka, Nobukazu [9 ]
机构
[1] Tokyo Gakugei Univ, Dept Informat Sci, Tokyo, Japan
[2] Tokyo Gakugei Univ, Dept Informat Educ, Tokyo, Japan
[3] Tokyo Univ Agr & Technol, Grad Sch Engn, Tokyo, Japan
[4] Nippon Inst Technol, Fac Engn, Saitama, Japan
[5] IBM Japan Ltd, Fujisawa, Kanagawa, Japan
[6] Inst Informat Secur, Grad Sch Informat Secur, Yokohama, Kanagawa, Japan
[7] Kanagawa Univ, Dept Informat Sci, Yokohama, Kanagawa, Japan
[8] Waseda Univ, Dept Comp Sci & Engn, Tokyo, Japan
[9] Natl Inst Informat, Informat Syst Architecture Sci Res Div, Tokyo, Japan
来源
2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2018), VOL 2 | 2018年
关键词
Secure software development support; security requirements analysis; modeling support system; knowledge base for secure software development;
D O I
10.1109/COMPSAC.2018.10235
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the growing number of services on the Internet, the need for secure software development has increased. It is required for secure software development to consider security in the whole development life cycle. It is indispensable for secure software development to use various types of security knowledge. This study deals with security requirement analysis. Existing security requirements modeling systems do not provide a function to create an artifact while referring to security knowledge in an integrated manner. In this paper, the authors develop a modeling support system for a misuse case diagram that enables the association of knowledge with elements that constitute the diagram. The results of an experiment using the system show the system's usefulness in both the integration of the knowledge base with the artifact creation environment and the association of the knowledge with the elements of the diagram.
引用
收藏
页码:234 / 239
页数:6
相关论文
共 50 条
  • [21] Requirement centric security evaluation of software intensive systems
    Savola, Reijo
    DepCoS - RELCOMEX '07: International Conference on Dependability of Computer Systems, Proceedings, 2007, : 135 - 142
  • [23] Software Engineering for Security as a Non-functional Requirement
    Ragab, Noha
    Ahmed, Ali
    AlHashmi, Saadat
    INTELLIGENT DATA ANALYSIS AND APPLICATIONS, 2015, 370 : 347 - 357
  • [24] A Hybrid Threat Model for Software Security Requirement Specification
    Omotunde, Habeeb
    Ibrahim, Rosziati
    2016 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2014, : 56 - 59
  • [25] Modeling Software Defined Security Using Multi-level Security Mechanism for SDN Environment
    Abdulqadder, Ihsan H.
    Zou, Deqing
    Aziz, Israa T.
    Yuan, Bin
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 1342 - 1346
  • [26] Software security evaluation using multilevel vulnerability discovery modeling
    Sharma, Ruchi
    Shrivastava, Avinash K.
    Hoang Pham
    QUALITY ENGINEERING, 2023, 35 (02) : 341 - 352
  • [27] Prospects for Software Security Growth Modeling
    Daughtrey, Taz
    2014 60TH ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM (RAMS), 2014,
  • [28] The Scheme of Security Requirement Acquisition Based on Knowledge Graph
    Zhang, Yu
    Li, Xiaohong
    2020 INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF SOFTWARE ENGINEERING (TASE 2020), 2020, : 225 - 231
  • [29] Towards an Ontological Approach to Information System Security and Safety Requirement Modeling and Reuse
    Arogundade, O. T.
    Akinwale, A. T.
    Jin, Z.
    Yang, X. G.
    INFORMATION SECURITY JOURNAL, 2012, 21 (03): : 137 - 149
  • [30] Dynamic Security Modeling in Risk Management Using Environmental Knowledge
    Fugini, Mariagrazia
    Hadjichristofi, George
    Teimourikia, Mahsa
    2014 IEEE 23RD INTERNATIONAL WETICE CONFERENCE (WETICE), 2014, : 429 - 434