UML based Security Function Policy Verification Method for Requirements Specification

被引:1
|
作者
Noro, Atsushi [1 ]
Matsuura, Saeko [1 ]
机构
[1] Shibaura Inst Technol, Grad Sch Engn, Div Elect Engn & Comp Sci, Minuma Ku, Saitama 3378570, Japan
来源
2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC) | 2013年
关键词
Commmon Criteria; Model Checking; Security; Requirements; Verification; UML;
D O I
10.1109/COMPSAC.2013.141
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
One key to success for high quality systems developments is to verify not only functional requirements but also the security requirements at the early stage of developments. However, it is difficult for general developers who have only less security knowledge to define verifiable requirements specification without leakages and errors. To reduce these some leakages or errors, this paper proposes a UML- based security requirements verification method using the security knowledge of Common Criteria.
引用
收藏
页码:832 / 833
页数:2
相关论文
共 50 条
  • [21] A UML-based static verification framework for security
    Siveroni, Igor
    Zisman, Andrea
    Spanoudakis, George
    REQUIREMENTS ENGINEERING, 2010, 15 (01) : 95 - 118
  • [22] Property specification and static verification of UML models
    Siveroni, Igor
    Zisman, Andrea
    Spanoudakis, George
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 96 - +
  • [23] From UML Activity Diagrams to Specification Requirements
    Drusinsky, Doron
    2008 IEEE INTERNATIONAL CONFERENCE ON SYSTEM OF SYSTEMS ENGINEERING (SOSE), 2008, : 69 - 73
  • [24] An Ontology-based Approach for Automatic Specification, Verification, and Validation of Software Security Requirements: Preliminary Results
    Tsoukalas, Dimitrios
    Siavvas, Miltiadis
    Mathioudaki, Maria
    Kehagias, Dionysios
    2021 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2021), 2021, : 83 - 91
  • [25] Specification of requirements of an IoT system witch UML
    Laguia, Daniel
    Hallar, Karim
    Sofia, Osiris
    Gonzalez, Leonardo
    Gesto, Esteban
    INFORMES CIENTIFICOS Y TECNICOS, 2022, 14 (02): : 200 - 215
  • [26] Formal Specification and Verification of an Extended Security Policy Model for Database Systems
    Hong, Zhu
    Yi, Zhu
    Li Chenyang
    Jie, Shi
    Ge, Fu
    Wang Yuanzhen
    APTC 2008: THIRD ASIA-PACIFIC TRUSTED INFRASTRUCTURE TECHNOLOGIES CONFERENCE, PROCEEDINGS, 2008, : 132 - 141
  • [27] Problems and deficiencies of UML as a requirements specification language
    Glinz, M
    TENTH INTERNATIONAL WORKSHOP ON SOFTWARE SPECIFICATION AND DESIGN, 2000, : 11 - 22
  • [28] Automatic Verification of Firewall Configurations with respect to Security Policy Requirements
    Matsumoto, Soutaro
    Bouhoula, Adel
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 640 - 647
  • [29] Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements
    Matsumoto, Soutaro
    Bouhoula, Adel
    PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS CISIS 2008, 2009, 53 : 123 - +
  • [30] Specification and verification of applications based on function blocks
    Zhang, Wei
    Halang, Wolfgang A.
    Dietrich, Christian
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2005, 3778 LNCS : 8 - 34