Security Requirements Engineering (SRE) Framework for Cyber-Physical Systems (CPS): SRE for CPS

被引:5
作者
ur Rehman, Shafiq [1 ]
Gruhn, Volker [1 ]
机构
[1] Univ Duisburg Essen, Inst Software Technol, D-45127 Essen, Germany
来源
NEW TRENDS IN INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES | 2017年 / 297卷
关键词
Security; security requirements; security requirements engineering; cyber-physical systems; framework; methodology; TROPOS;
D O I
10.3233/978-1-61499-800-6-153
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security is an important feature of the software. Integrating security requirements right at the beginning not only ensure secure software but also save a lot of precious time and reduce the effort of rework of software development team. However, to build a secure system is not an easy task and it is extremely difficult to develop a secure system, especially in the case of cyber-physical systems (CPS). In this paper, we propose a security requirements engineering framework that provides ways to determine security requirements throughout the requirements engineering phase which consists of a number of activities to elicit and finalize the security requirements for CPS. Additionally, we determine the activities that need to be implemented in the security requirements engineering framework to address security requirements for CPS. We compare our proposed security requirements engineering framework with other existing software security frameworks. The result shows that not all software security frameworks perform all the basic and important activities in the development of secure software systems. This may also result in a development of an unsecure cyber-physical systems. Furthermore, this comparison survey helps us to identify the short-comings in SRE frameworks which has been rectified in our proposed security requirements engineering framework for CPS.
引用
收藏
页码:153 / 163
页数:11
相关论文
共 50 条
[1]  
Allen Julia H, 2008, Software security engineering.
[2]  
[Anonymous], 2011, The impact of control technology
[3]  
[Anonymous], 2016, ACM Comput. Surv
[4]  
Ashford W, 2009, ON DEMAND SERVICE AI
[5]  
Beckers K., 2014, Eng. Secure Future Internet Serv. Syst.: Curr. Res., P315
[6]  
Belloir N., 2014, P 2014 EUR C SOFTW A, P32
[7]   Eliciting security requirements through misuse activities [J].
Braz, Fabricio A. ;
Ferriandez, Eduardo B. ;
VanHilst, Michael .
DEXA 2008: 19TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2008, :328-+
[8]   A recommendation system for predicting risks across multiple business process instances [J].
Conforti, Raffaele ;
de Leoni, Massimiliano ;
La Rosa, Marcello ;
van der Aalst, Wil M. P. ;
ter Hofstede, Arthur H. M. .
DECISION SUPPORT SYSTEMS, 2015, 69 :1-19
[9]  
DAXU L, 2014, INFORMAT, V10, P2233, DOI DOI 10.1109/TII.2014.2300753
[10]  
den Braber Folker., 2003, UML UNIFIED PROCESS, P332