UML based Security Function Policy Verification Method for Requirements Specification

被引:1
|
作者
Noro, Atsushi [1 ]
Matsuura, Saeko [1 ]
机构
[1] Shibaura Inst Technol, Grad Sch Engn, Div Elect Engn & Comp Sci, Minuma Ku, Saitama 3378570, Japan
来源
2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC) | 2013年
关键词
Commmon Criteria; Model Checking; Security; Requirements; Verification; UML;
D O I
10.1109/COMPSAC.2013.141
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
One key to success for high quality systems developments is to verify not only functional requirements but also the security requirements at the early stage of developments. However, it is difficult for general developers who have only less security knowledge to define verifiable requirements specification without leakages and errors. To reduce these some leakages or errors, this paper proposes a UML- based security requirements verification method using the security knowledge of Common Criteria.
引用
收藏
页码:832 / 833
页数:2
相关论文
共 50 条
  • [31] A flexible method for information system security policy specification
    Ortalo, R
    COMPUTER SECURITY - ESORICS 98, 1998, 1485 : 67 - 84
  • [32] Specification and verification of applications based on function blocks
    Zhang, W
    Halang, WA
    Dietrich, C
    COMPONENT-BASED SOFTWARE DEVELOPMENT FOR EMBEDDED SYSTEMS: AN OVERVIEW OF CURRENT RESEARCH TRENDS, 2005, 3778 : 8 - 34
  • [33] CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems
    Jesus Varela-Vaca, Angel
    Rosado, David G.
    Sanchez, Luis E.
    Teresa Gomez-Lopez, Maria
    Gasca, Rafael M.
    Fernandez-Medina, Eduardo
    COMPUTERS IN INDUSTRY, 2021, 132
  • [34] UML specification of access control policies and their formal verification
    Koch M.
    Parisi-Presicce F.
    Software & Systems Modeling, 2006, 5 (4) : 429 - 447
  • [35] An Approach for Interoperability Requirements Specification and Verification
    Mallck, Sihem
    Daclin, Nicolas
    Chapurlat, Vincent
    ENTERPRISE INTEROPERABILITY, 2011, 76 : 89 - 102
  • [36] Specification of function block applications with UML
    Zhang, W
    Halang, WA
    Diedrich, C
    2005 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION (ICRA), VOLS 1-4, 2005, : 4002 - 4007
  • [37] UML Activity Diagrams in Requirements Specification of Logic Controllers
    Grobelna, Iwona
    Grobelny, Michal
    INTERNATIONAL CONFERENCE OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING 2015 (ICCMSE 2015), 2015, 1702
  • [38] Specification, verification, and quantification of security in model-based systems
    Ouchani, Samir
    Debbabi, Mourad
    COMPUTING, 2015, 97 (07) : 691 - 711
  • [39] Specification, verification, and quantification of security in model-based systems
    Samir Ouchani
    Mourad Debbabi
    Computing, 2015, 97 : 691 - 711
  • [40] Constructing Security Cases Based on Formal Verification of Security Requirements in Alloy
    Zeroual, Marwa
    Hamid, Brahim
    Adedjouma, Morayo
    Jaskolka, Jason
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2023 WORKSHOPS, 2023, 14182 : 15 - 25