Effectiveness and performance analysis of model-oriented security requirements engineering to elicit security requirements: a systematic solution for developing secure software systems

被引:6
作者
Salini, P. [1 ]
Kanmani, S. [2 ]
机构
[1] Pondicherry Engn Coll, Dept Comp Sci & Engn, Pondicherry, India
[2] Pondicherry Engn Coll, Dept Informat Technol, Pondicherry, India
关键词
Assets; Security requirements; Security requirements engineering; Software systems; Threats; Vulnerabilities;
D O I
10.1007/s10207-015-0305-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software systems are becoming more and more critical in every domain of human society. These systems are used not only by corporates and governments, but also by individuals and across networks of organizations. The wide use of software systems has resulted in the need to contain a large amount of critical information and processes, which certainly need to remain secure. As a consequence, it is important to ensure that the systems are secure by considering security requirements at the early phases of software development life cycle. In this paper, we propose to consider security requirements as functional requirements and apply model-oriented security requirements engineering framework as a systematic solution to elicit security requirements for e-governance software systems. As the result, high level of security can be achieved by more coverage of assets and threats, and identifying more traces of vulnerabilities in the early stages of requirements engineering. This in turn will help to elicit effective security requirements as countermeasures with business requirements.
引用
收藏
页码:319 / 334
页数:16
相关论文
共 36 条
[1]  
[Anonymous], 2004, Threat modeling
[2]  
[Anonymous], 2002, MAINICHI NEWSPA 0624
[3]  
Appel A.W., 2009, EVT WOTE09 EL VOT TE
[4]  
Caarls S., 2010, E VOTING HDB KEY STE
[5]  
Feldman A.J., 2007, EL VOT TECHN WORKSH
[6]  
FERNANDEZ EB, 2004, P INT S WEB SERV APP
[7]  
Giorgini P., 2007, MODELING SECURITY TR
[8]  
GRAHAM D., 2006, INTRO CLASP PROCESS
[9]   Security requirements engineering: A framework for representation and analysis [J].
Haley, Charles B. ;
Laney, Robin ;
Moffett, Jonathan D. ;
Nuseibeh, Bashar .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2008, 34 (01) :133-153
[10]  
Howard M, 2005, COMPUTER SECURITY IN THE 21ST CENTURY, P109, DOI 10.1007/0-387-24006-3_8