UML based Security Function Policy Verification Method for Requirements Specification

被引:1
作者
Noro, Atsushi [1 ]
Matsuura, Saeko [1 ]
机构
[1] Shibaura Inst Technol, Grad Sch Engn, Div Elect Engn & Comp Sci, Minuma Ku, Saitama 3378570, Japan
来源
2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC) | 2013年
关键词
Commmon Criteria; Model Checking; Security; Requirements; Verification; UML;
D O I
10.1109/COMPSAC.2013.141
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
One key to success for high quality systems developments is to verify not only functional requirements but also the security requirements at the early stage of developments. However, it is difficult for general developers who have only less security knowledge to define verifiable requirements specification without leakages and errors. To reduce these some leakages or errors, this paper proposes a UML- based security requirements verification method using the security knowledge of Common Criteria.
引用
收藏
页码:832 / 833
页数:2
相关论文
共 50 条
  • [41] Verification framework for UML - Based design of embedded systems
    Kardos, M
    Zhao, YH
    DESIGN METHODS AND APPLICATIONS FOR DISTRIBUTED EMBEDDED SYSTEMS, 2004, 150 : 21 - 30
  • [42] A security modeling and verification method of embedded software based on Z and MARTE
    Hu, Xinwen
    Zhuang, Yi
    Zhang, Fuyuan
    COMPUTERS & SECURITY, 2020, 88
  • [43] A UML-based pattern specification technique
    France, RB
    Kim, DK
    Ghosh, S
    Song, EJ
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2004, 30 (03) : 193 - 206
  • [44] A Model-Based Framework for Security Policy Specification, Deployment and Testing
    Mouelhi, Tejeddine
    Fleurey, Franck
    Baudry, Benoit
    Le Traon, Yves
    MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2008, 5301 : 537 - 552
  • [45] AN UML ACTIVITIES DIAGRAMS TRANSLATION INTO EVENT B SUPPORTING THE SPECIFICATION AND THE VERIFICATION OF WORKFLOW APPLICATION MODELS From UML Activities Diagrams to Event B
    Ben Ayed, Leila Jemni
    Hamdi, Najet
    Hlaoui, Yousra Bendaly
    ICSOFT 2010: PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL 2, 2010, : 329 - 332
  • [46] Semantic Formalization of XBRL Specification Based on UML
    Huang, L. F.
    Li, J. M.
    Zhao, H. Z.
    INTERNATIONAL CONFERENCE ON ADVANCES IN MANAGEMENT ENGINEERING AND INFORMATION TECHNOLOGY (AMEIT 2015), 2015, : 750 - 758
  • [47] Security Policy Verification Tool for Geographical Information Systems
    Kotenko, Igor
    Tishkov, Artem
    Chervatuk, Olga
    Sidelnikova, Ekaterina
    INFORMATION FUSION AND GEOGRAPHIC INFORMATION SYSTEMS, PROCEEDINGS, 2007, : 128 - 146
  • [48] Specification and Verification of Security Properties of e-Contracts
    Abou El Kalam, Anas
    Idboutker, Nourredine
    PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 427 - 430
  • [49] Sound methods and effective tools for model-based security engineering with UML
    Jürjens, J
    ICSE 05: 27TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2005, : 322 - 331
  • [50] Verification of Temporal Requirements of Complex Systems Using UML Patterns, Application to a Railway Control Example
    Ghazel, Mohamed
    Masmoudi, Malek
    Toguyeni, Armand
    2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEM OF SYSTEMS ENGINEERING SOSE 2009, 2009, : 7 - +