Verifying Security Requirements using Model Checking Technique for UML-Based Requirements Specification

被引:0
|
作者
Aoki, Yoshitaka [1 ]
Matsuura, Saeko [1 ]
机构
[1] Shibaura Inst Technol, Grad Sch Engn & Sci, Minuma Ku, Saitama 3378570, Japan
来源
2014 IEEE 1ST INTERNATIONAL WORKSHOP ON REQUIREMENTS ENGINEERING AND TESTING (RET) | 2014年
关键词
UML; Security Requirements; Verification; Model Checking; Common Criteria; Access Control;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Use case analysis is known to be an effective method to clarify functional requirements. Security requirements such as access or information control tend to increase the complexity of functional requirements, and therefore, need to be correctly implemented to minimize risks. However, general developers find it difficult to correctly specify adequate security requirements during the initial phases of the software development process. We propose a method to verify security requirements whose specifications are based on Unified Modeling Language (UML) using the model checking technique and Common Criteria security knowledge. Common Criteria assists in defining adequate security requirements in the form of a table. This helps developers verify whether UML-based requirements analysis models meet those requirements in the early stages of software development. The UML model and the table are transformed into a finite automaton in the UPPAAL model checking tool.
引用
收藏
页码:18 / 25
页数:8
相关论文
共 50 条
  • [41] UML-BASED MODELING AND ANALYSIS OF SECURITY THREATS
    Kong, Jun
    Xu, Dianxiang
    Zeng, Xiaoqin
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2010, 20 (06) : 875 - 897
  • [42] KNOWLEDGE BASED MDA REQUIREMENTS SPECIFICATION AND VALIDATION TECHNIQUE
    Lopata, Audrius
    Ambraziunas, Martas
    Gudas, Saulius
    TRANSFORMATIONS IN BUSINESS & ECONOMICS, 2012, 11 (01): : 248 - 260
  • [43] A UML-based static verification framework for security
    Siveroni, Igor
    Zisman, Andrea
    Spanoudakis, George
    REQUIREMENTS ENGINEERING, 2010, 15 (01) : 95 - 118
  • [44] Requirements specification model based on multiple viewpoints
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (09): : 953 - 957
  • [45] Enterprise model based specification of functional requirements
    Lopata, Audrius
    Gudas, Saulius
    INFORMATION TECHNOLOGIES' 2008, PROCEEDINGS, 2008, : 189 - 194
  • [46] A UML-based static verification framework for security
    Igor Siveroni
    Andrea Zisman
    George Spanoudakis
    Requirements Engineering, 2010, 15 : 95 - 118
  • [47] FORMAL SPECIFICATION OF SECURITY REQUIREMENTS USING THE THEORY OF NORMATIVE POSITIONS
    JONES, AJI
    SERGOT, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 648 : 103 - 121
  • [48] A Tool-based Semantic Framework for Security Requirements Specification
    Daramola, Olawande
    Sindre, Guttorm
    Moser, Thomas
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2013, 19 (13) : 1940 - 1962
  • [49] Requirements-based UML
    Schulz, JD
    EIGHTEENTH ANNUAL PACIFIC NORTHWEST SOFTWARE QUALITY CONFERENCE, PROCEEDINGS, 2000, : 411 - 426
  • [50] Requirements-based UML
    Schulz, JD
    OOIS 2000: 6TH INTERNATIONAL CONFERENCE ON OBJECT ORIENTED INFORMATION SYSTEMS, PROCEEDINGS, 2001, : 253 - 267