A business process-based method on security requirements analysis of information systems

被引:0
作者
Yu, ZW [1 ]
Tang, RZ [1 ]
Ye, FB [1 ]
机构
[1] Zhejiang Univ, Inst Mfg Engn, Hangzhou 310027, Peoples R China
来源
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2: MODERN INDUSTRIAL ENGINEERING AND INNOVATION IN ENTERPRISE MANAGEMENT | 2005年
关键词
business processes; information systems; security requirements; risk packet; risk transferring model; coverage analysis;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The analysis of security requirements is the important premise and basis of security management. As the change of the background and task of information systems,the asset-based risk analysis methods come out to be out of place. A business process-based security requirements analysis method is put forward. A tri-layer information systems model is established to be the basis and the communication platform of security requirement analysis. The primary security requirements can be listed through analyzing the security requirements of business processes. A concept of risk packet and a risk transferring model are brought forward to facilitate the risk analysis of assets of information systems. Then, a coverage analysis method is used to check whether all kinds of risk of assets are satisfied by the primary security requirements. If some kinds of risk can't be covered by the primary requirements, supplementary requirements will be needed to form the final security requirements list. This method, which aims to protect the security operations of business processes supported by information systems,has strong objective and can facilitate the engineering applications of security management.
引用
收藏
页码:1005 / 1009
页数:5
相关论文
共 8 条
  • [1] CRAFT R, OPEN FRAMEWORK RISK
  • [2] FLETCHER SK, 1995, SOFTWARE SYSTEM RISK, P66
  • [3] From risk analysis to security requirements
    Gerber, M
    von Solms, R
    [J]. COMPUTERS & SECURITY, 2001, 20 (07) : 577 - 584
  • [4] Kokolakis S.A., 2000, INFORM MANAGE COMPUT, V8, P107, DOI DOI 10.1108/09685220010339192
  • [5] LABUSCHAGNE L, 2005, RISK ANAL GENERATION
  • [6] Security Analysis of Electronic Business Processes
    Susanne Röhrig
    Konstantin Knorr
    [J]. Electronic Commerce Research, 2004, 4 (1-2) : 59 - 81
  • [7] SHARON H, 1996, INFORM MANAGEMENT CO, V4, P19
  • [8] WRIGHT W, 1999, 3 GENERATION RISK MA, P9