A Security Ontology for Security Requirements Elicitation

被引:0
|
作者
Souag, Amina [1 ]
Salinesi, Camille [1 ]
Mazo, Raul [1 ]
Comyn-Wattiau, Isabelle [2 ,3 ]
机构
[1] Univ Paris 01, CRI, F-75231 Paris 05, France
[2] CNAM, CEDRIC, Paris, France
[3] ESSEC Business Sch, Paris, France
来源
ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015) | 2015年 / 8978卷
关键词
Security; ontology; concepts; security requirements; elicitation; WEB SERVICES;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security is an important issue that needs to be taken into account at all stages of information system development, including early requirements elicitation. Early analysis of security makes it possible to predict threats and their impacts and define adequate security requirements before the system is in place. Security requirements are difficult to elicit, analyze, and manage. The fact that analysts' knowledge about security is often tacit makes the task of security requirements elicitation even harder. Ontologies are known for being a good way to formalize knowledge. Ontologies, in particular, have been proved useful to support reusability. Requirements engineering based on predefined ontologies can make the job of requirement engineering much easier and faster. However, this very much depends on the quality of the ontology that is used. Some security ontologies for security requirements have been proposed in the literature. None of them stands out as complete. This paper presents a core and generic security ontology for security requirements engineering. Its core and generic status is attained thanks to its coverage of wide and high-level security concepts and relationships. We implemented the ontology and developed an interactive environment to facilitate the use of the ontology during the security requirements engineering process. The proposed security ontology was evaluated by checking its validity and completeness compared to other ontologies. Moreover, a controlled experiment with end-users was performed to evaluate its usability.
引用
收藏
页码:157 / 175
页数:19
相关论文
共 50 条
  • [1] An Ontology Based Collaborative Recommender System for Security Requirements Elicitation
    Williams, Imano
    2018 IEEE 26TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2018), 2018, : 448 - 453
  • [2] An Extended Ontology for Security Requirements
    Massacci, Fabio
    Mylopoulos, John
    Paci, Federica
    Tun, Thein Thun
    Yu, Yijun
    ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS, 2011, 83 : 622 - +
  • [3] Security Requirements Elicitation and Modeling Authorizations
    Goel, Rajat
    Govil, Mahesh Chandra
    Singh, Girdhari
    SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 239 - 250
  • [4] Security Requirements Elicitation and Assessment Mechanism (SecREAM)
    Goel, Rajat
    Govil, M. C.
    Singh, Girdhari
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1862 - 1866
  • [5] Security Requirements Elicitation from Business Processes
    Matulevicius, Raimundas
    BUSINESS PROCESS MANAGEMENT WORKSHOPS( BPM 2014), 2015, 202
  • [6] Requirements Elicitation and Derivation of Security Policy Templates
    Rudolph, Manuel
    Feth, Denis
    Doerr, Joerg
    Spilker, Joerg
    2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2016, : 283 - 292
  • [7] Security requirements elicitation: a smart health case
    Rabii, Anass
    Assoul, Saliha
    Roudies, Ounsa
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 776 - 781
  • [8] Existing Vulnerability Information in Security Requirements Elicitation
    Amin, Rayhan
    Bhowmik, Tanmay
    2022 IEEE 30TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW), 2022, : 220 - 225
  • [9] Security requirements elicitation via weaving scenarios based on security evaluation criteria
    Itoga, Hiroya
    Ohnishi, Atsushi
    USIC 2007: PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, 2007, : 70 - 79
  • [10] SafeSec Tropos: Joint security and safety requirements elicitation
    Kavallieratos, Georgios
    Katsikas, Sokratis
    Gkioulos, Vasileios
    COMPUTER STANDARDS & INTERFACES, 2020, 70