Using Security and Domain ontologies for Security Requirements Analysis

被引:16
作者
Souag, Amina [1 ]
Salinesi, Camille [1 ]
Wattiau, Isabelle [2 ]
Mouratidis, Haris [3 ]
机构
[1] Univ Paris 01, CRI, F-75231 Paris 05, France
[2] CEDRIC, CNAM, ESSEC Business Sch, Paris 05, France
[3] Univ East London, Sch Architecture Comp & Engn, London E15 4LZ, England
来源
2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW) | 2013年
关键词
Security; ontology; domain; requirements elicitation; analysis; method;
D O I
10.1109/COMPSACW.2013.124
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Recent research has argued about the importance of considering security during Requirements Engineering (RE) stage. Literature also emphasizes the importance of using ontologies to facilitate requirements elicitation. Ontologies are known to be rich sources of knowledge, and, being structured and equipped with reasoning features, they form a powerful tool to handle requirements. We believe that security being a multi-faceted problem, a single security ontology is not enough to guide SR Engineering (SRE) efficiently. Indeed, security ontologies only focus on technical and domain independent aspects of security. Therefore, one can hypothesize that domain knowledge is needed too. Our question is "how to combine the use of security ontologies and domain ontologies to guide requirements elicitation efficiently and effectively?" We propose a method that exploits both types of ontologies dynamically through a collection of heuristic production rules. We demonstrate that the combined use of security ontologies with domain ontologies to guide SR elicitation is more effective than just relying on security ontologies. This paper presents our method and reports a preliminary evaluation conducted through critical analysis by experts. The evaluation shows that the method provides a good balance between the genericity with respect to the ontologies (which do not need to be selected in advance), and the specificity of the elicited requirements with respect to the domain at hand.
引用
收藏
页码:101 / 107
页数:7
相关论文
共 20 条
[1]  
Anderson R.J., 2010, Security Engineering: A Guide to Building Dependable Distributed Systems
[2]  
[Anonymous], 2009, P 4 INT S INF COMP C
[3]  
[Anonymous], DEPENDABLE REQUIREME
[4]  
[Anonymous], 2010, DESIGN RES INFORM SY
[5]  
Bjorner D., 2008, LECT NOTES COMPUTER
[6]  
Bjorner D, 2010, LECT NOTES COMPUT SC, V5947, P2, DOI 10.1007/978-3-642-11486-1_2
[7]  
Daramola O., 2012, MOVE MEANINGFUL INTE, P194
[8]  
Dritsas S., KNOWLEDGE BASED APPR
[9]   Ontology-based Reasoning in Requirements Elicitation [J].
Dzung, Dang Viet ;
Ohnishi, Atsushi .
SEFM 2009: SEVENTH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND FORMAL METHODS, 2009, :263-+
[10]  
Kaiya H., 2006, RE 14 IEEE INT C