Security Requirement Modeling Support System using Software Security Knowledge Base

被引:3
|
作者
Hazeyama, Atsuo [1 ]
Tanaka, Shun'chi [2 ]
Tanaka, Takafumi [3 ]
Hashiura, Hiroaki [4 ]
Munetoh, Seiji [5 ]
Okubo, Takao [6 ]
Kaiya, Haruhiko [7 ]
Washizaki, Hironori [8 ]
Yoshioka, Nobukazu [9 ]
机构
[1] Tokyo Gakugei Univ, Dept Informat Sci, Tokyo, Japan
[2] Tokyo Gakugei Univ, Dept Informat Educ, Tokyo, Japan
[3] Tokyo Univ Agr & Technol, Grad Sch Engn, Tokyo, Japan
[4] Nippon Inst Technol, Fac Engn, Saitama, Japan
[5] IBM Japan Ltd, Fujisawa, Kanagawa, Japan
[6] Inst Informat Secur, Grad Sch Informat Secur, Yokohama, Kanagawa, Japan
[7] Kanagawa Univ, Dept Informat Sci, Yokohama, Kanagawa, Japan
[8] Waseda Univ, Dept Comp Sci & Engn, Tokyo, Japan
[9] Natl Inst Informat, Informat Syst Architecture Sci Res Div, Tokyo, Japan
来源
2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2018), VOL 2 | 2018年
关键词
Secure software development support; security requirements analysis; modeling support system; knowledge base for secure software development;
D O I
10.1109/COMPSAC.2018.10235
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the growing number of services on the Internet, the need for secure software development has increased. It is required for secure software development to consider security in the whole development life cycle. It is indispensable for secure software development to use various types of security knowledge. This study deals with security requirement analysis. Existing security requirements modeling systems do not provide a function to create an artifact while referring to security knowledge in an integrated manner. In this paper, the authors develop a modeling support system for a misuse case diagram that enables the association of knowledge with elements that constitute the diagram. The results of an experiment using the system show the system's usefulness in both the integration of the knowledge base with the artifact creation environment and the association of the knowledge with the elements of the diagram.
引用
收藏
页码:234 / 239
页数:6
相关论文
共 50 条
  • [41] Security on software life cycle using intrusion detection system
    Myat Myat Min
    Khin Haymar Saw Hla
    APSITT 2005: 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, Proceedings, 2005, : 360 - 363
  • [42] A Knowledge-based Expert System for Supporting Security in Software Engineering Projects
    Azzazi, Ahmad
    Shkoukani, Mohammad
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (01) : 395 - 400
  • [43] Sarch-Knows: A Knowledge Graph for Modeling Security Scenarios at the Software Architecture Level
    Vergara-Vargas, Jeisson
    Restrepo-Calle, Felipe
    Sadou, Salah
    Tibermacine, Chouki
    SOFTWARE ARCHITECTURE: ECSA 2023 TRACKS, WORKSHOPS, AND DOCTORAL SYMPOSIUM, ECSA 2023, CASA 2023, AMP 2023, FAACS 2023, DEMESSA 2023, QUALIFIER 2023, TWINARCH 2023, 2024, 14590 : 107 - 119
  • [44] The development of security system and visual service support software for on-line diagnostics
    Inaba, M
    Aizono, T
    Sonobe, K
    Fukube, H
    Iizumi, T
    Arima, J
    Usami, Y
    2001 IEEE INTERNATIONAL SYMPOSIUM ON SEMICONDUCTOR MANUFACTURING, CONFERENCE PROCEEDINGS, 2001, : 45 - 48
  • [45] The Flask security architecture: System support for diverse security policies
    Spencer, R
    Smalley, S
    Loscocco, P
    Hibler, M
    Andersen, D
    Lepreau, J
    USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), 1999, : 123 - 139
  • [46] Modeling of RF Security System Using Smart Antennas
    Oluwole, Ayodele S.
    Srivastava, Viranjay M.
    2015 INTERNATIONAL CONFERENCE ON CYBERSPACE (CYBER-ABUJA), 2015, : 118 - 122
  • [47] System level Security modeling using Attack trees
    Khand, Parvaiz Ahmed
    2009 2ND INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL AND COMMUNICATION, 2009, : 115 - 120
  • [48] Software Security Modeling Based On Petri Nets
    Mohsenzadeh, A.
    JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE-JMCS, 2015, 15 (01): : 70 - 77
  • [49] Evaluation: Control system security software
    Derynck, R
    CONTROL ENGINEERING, 2006, 53 (05) : IP15 - IP16
  • [50] Modeling and quantification of security attributes of software systems
    Madan, BB
    Goseva-Popstojanova, K
    Vaidyanathan, K
    Trivedi, KS
    INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 505 - 514