Engineering secure software by modelling privacy and security requirements

被引:0
作者
Kreeger, MN [1 ]
Duncan, I [1 ]
机构
[1] Univ St Andrews, Sch Comp Sci, St Andrews, Fife, Scotland
来源
39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS | 2005年
关键词
D O I
10.1109/CCST.2005.1594820
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Requirements are individual statements, usually expressed in a form of natural language, specifying the behaviour and constraints of a proposed system. Due to the intrinsic value of correct requirements it is therefore essential for the process to be implemented correctly and that the requirements themselves reflect the true needs of the proposed system. The majority of developed systems introduce the concerns of privacy and security, however, traditional requirements engineering techniques have not addressed these issues appropriately. Further, the concepts of privacy, security, and the interrelated concept of trust, have not been accurately defined in terms of requirements engineering. Natural language is shown to be the most prevalent form of knowledge used to represent requirements, however, natural language introduces a number of inherent problems which can lead to ambiguity and specifications open to interpretation. When reasoning with privacy and security concerns the resulting specification should be both clear and concise in the stipulation of requirements. Therefore, before attempting to model privacy and security at the requirements engineering level it is essential to have an understanding and appreciation of the issues involved. Consideration is given to the various concerns that would effect methodology development and once assessed a possible approach to modelling privacy and security requirements is highlighted.
引用
收藏
页码:37 / 40
页数:4
相关论文
共 14 条
[1]  
Alexander I., 2001, TELELOGIC NEWSBYTE
[2]  
BERRY DM, 2001, INT WORKSH REQ ENG L
[3]  
Boehm B. W., 1981, SOFTWARE ENG EC
[4]   7 MORE MYTHS OF FORMAL METHODS [J].
BOWEN, JP ;
HINCHEY, MG .
IEEE SOFTWARE, 1995, 12 (04) :34-41
[5]   Mathematical notation in formal specification: Too difficult for the masses? [J].
Finney, K .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1996, 22 (02) :158-159
[6]  
FISCHERHUBNER S, 2001, LNCS, V1958
[7]   ON VISUAL FORMALISMS [J].
HAREL, D .
COMMUNICATIONS OF THE ACM, 1988, 31 (05) :514-530
[8]  
Kotonya G., 1998, Requirements Engineering: Processes and Techniques
[9]  
KREEGER MN, 2004, P INT C SOFTW ENG RE, P813
[10]   Specifications are necessarily informal more myths of formal methods [J].
Le Charlier, B ;
Flener, P .
JOURNAL OF SYSTEMS AND SOFTWARE, 1998, 40 (03) :275-296