Verifying Security Requirements using Model Checking Technique for UML-Based Requirements Specification

被引:0
|
作者
Aoki, Yoshitaka [1 ]
Matsuura, Saeko [1 ]
机构
[1] Shibaura Inst Technol, Grad Sch Engn & Sci, Minuma Ku, Saitama 3378570, Japan
来源
2014 IEEE 1ST INTERNATIONAL WORKSHOP ON REQUIREMENTS ENGINEERING AND TESTING (RET) | 2014年
关键词
UML; Security Requirements; Verification; Model Checking; Common Criteria; Access Control;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Use case analysis is known to be an effective method to clarify functional requirements. Security requirements such as access or information control tend to increase the complexity of functional requirements, and therefore, need to be correctly implemented to minimize risks. However, general developers find it difficult to correctly specify adequate security requirements during the initial phases of the software development process. We propose a method to verify security requirements whose specifications are based on Unified Modeling Language (UML) using the model checking technique and Common Criteria security knowledge. Common Criteria assists in defining adequate security requirements in the form of a table. This helps developers verify whether UML-based requirements analysis models meet those requirements in the early stages of software development. The UML model and the table are transformed into a finite automaton in the UPPAAL model checking tool.
引用
收藏
页码:18 / 25
页数:8
相关论文
共 50 条
  • [21] Component specification and composition in a UML-based tool
    Roubtsova, EE
    Jonkers, HBM
    Kuiper, R
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XVIII, PROCEEDINGS: INFORMATION SYSTEMS, CONCEPTS AND APPLICATIONS OF SYSTEMICS, CYBERNETICS AND INFORMATICS, 2002, : 85 - 90
  • [22] UML-based approach for network QoS specification
    Teyssié, C
    Mammeri, Z
    NETWORKING - ICN 2005, PT 1, 2005, 3420 : 277 - 285
  • [23] Goal-oriented patterns for UML-Based modeling of embedded systems requirements
    Goldsby, Heather J.
    Konrad, Sascha
    Cheng, Betty H. C.
    HASE 2007: 10TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2007, : 7 - +
  • [24] From UML Activity Diagrams to Specification Requirements
    Drusinsky, Doron
    2008 IEEE INTERNATIONAL CONFERENCE ON SYSTEM OF SYSTEMS ENGINEERING (SOSE), 2008, : 69 - 73
  • [25] Software requirements specification database based on requirements frame model
    Ohnishi, A
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON REQUIREMENTS ENGINEERING, 1996, : 221 - 228
  • [26] Specification of requirements of an IoT system witch UML
    Laguia, Daniel
    Hallar, Karim
    Sofia, Osiris
    Gonzalez, Leonardo
    Gesto, Esteban
    INFORMES CIENTIFICOS Y TECNICOS, 2022, 14 (02): : 200 - 215
  • [27] Evaluation of Ontology-based Checking of Software Requirements Specification
    Dzung, Dang Viet
    Ohnishi, Atsushi
    2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2013, : 425 - 430
  • [28] Problems and deficiencies of UML as a requirements specification language
    Glinz, M
    TENTH INTERNATIONAL WORKSHOP ON SOFTWARE SPECIFICATION AND DESIGN, 2000, : 11 - 22
  • [29] The approach to consistency checking of functional requirements specification
    Butkiene, R
    Butleris, R
    Danikauskas, T
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XVIII, PROCEEDINGS: INFORMATION SYSTEMS, CONCEPTS AND APPLICATIONS OF SYSTEMICS, CYBERNETICS AND INFORMATICS, 2002, : 67 - 72
  • [30] Verifying UML-RT Protocol Conformance Using Model Checking
    Moffett, Yann
    Beaulieu, Alain
    Dingel, Juergen
    MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS, 2011, 6981 : 410 - +