Security Requirements Engineering Framework with BPMN 2.0.2 Extension Model for Development of Information Systems

被引:21
作者
Zareen, Saima [1 ]
Akram, Adeel [1 ]
Ahmad Khan, Shoab [2 ]
机构
[1] Univ Engn & Technol, Fac Telecom & Informat Engn, Taxila 47050, Pakistan
[2] Natl Univ Sci & Technol, Dept Comp & Software Engn, Islamabad 46000, Pakistan
来源
APPLIED SCIENCES-BASEL | 2020年 / 10卷 / 14期
关键词
security requirements; business process management notations (BPMN); manufacturing; security threats; security goals; information systems; enterprise resource planning; ASSURANCE; THREATS; ERP;
D O I
10.3390/app10144981
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Featured Application This work can be applied with the Requirements Engineering Process to elicit the security requirements for an information system's development. With recent advancements of technologies such as Internet of Things and cloud computing, security of information systems has emerged as a critical issue. This has created a need for elicitation and analysis of the security requirements at an early stage of system development. These requirements should also be expressed using visual notations that can encapsulate the vision of different stakeholders related to security. While business process management notation (version 2.0.2) is a widely used graphical representation for business requirements and makes it easier to define and communicate business processes between different stakeholders of the system. Moreover, extension mechanisms are available to model the specific needs of an organization. Due to its flexible structure for defining new extensions, it can be adapted to model security requirements in the information system (IS). Towards this, we propose a threat profile security framework to define the security requirements of manufacturing systems for businesses, which are at a stage of infancy to adapt or evolve the IS with the changing needs of a business environment. In particular, the framework is modeled by extending Business Process Management Notation and is applied in a manufacturing industry process at the shop floor level. We show through a case study example that the threat goal-based framework is broader and, hence, covers a majority of security concerns of organizations.
引用
收藏
页数:24
相关论文
共 56 条
[1]  
Abdelrazek M., 2016, ADAPTABLE SOFTWARE A, P99
[2]  
Al-Sayid NA, 2013, INT CONF COMP SCI, P60, DOI 10.1109/CSIT.2013.6588759
[3]  
[Anonymous], 2013, 215 ISOTC, V2014, P38
[4]  
[Anonymous], 2009, DATABASE SECURITY GU, P1
[5]  
[Anonymous], 2015, Handbook on Business Process Management 1: Introduction, Methods, and Information Systems, DOI [DOI 10.1007/978-3-642-45100-3_10, 10.1007/978-3-642-45100-3, DOI 10.1007/978-3-642-45100-3, 10.1007/978-3-642-45100-310, DOI 10.1007/978-3-642-45100-310]
[6]   Taxonomy of mobile users' security awareness [J].
Bitton, Ron ;
Finkelshtein, Andrey ;
Sidi, Lior ;
Puzis, Rami ;
Rokach, Lior ;
Shabtai, Asaf .
COMPUTERS & SECURITY, 2018, 73 :266-293
[7]   Tropos: An agent-oriented software development methodology [J].
Bresciani, P ;
Perini, A ;
Giorgini, P ;
Giunchiglia, F ;
Mylopoulos, J .
AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS, 2004, 8 (03) :203-236
[8]   When Program Analysis Meets Mobile Security: An Industrial Study of Misusing Android Internet Sockets [J].
Bu, Wenqi ;
Xue, Minhui ;
Xu, Lihua ;
Zhou, Yajin ;
Tang, Zhushou ;
Xie, Tao .
ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING, 2017, :842-847
[9]  
Cherdantseva Y., 2014, THESIS
[10]  
Cherdantseva Y, 2012, LECT NOTES BUS INF P, V125, P107