An approach to security requirements engineering for a high assurance system

被引:4
作者
Irvine C.E. [1 ]
Levin T. [1 ,2 ]
Wilson J.D. [1 ]
Shifflett D. [1 ]
Pereira B. [1 ]
机构
[1] Department of Computer Science, Naval Postgraduate School, Monterey, CA
[2] Department of Computer Science, Naval Postgraduate School, Monterey
关键词
Assurance; Engineering; Requirements; Security; Specification; Threat;
D O I
10.1007/s007660200015
中图分类号
学科分类号
摘要
Requirements specifications for high-assurance secure systems are rare in the open literature. This paper examines the development of a requirements document for a multilevel secure system that must meet stringent assurance and evaluation requirements. The system is designed to be secure, yet combines popular commercial components with specialised high-assurance ones. Functional and non-functional requirements pertinent to security are discussed. A multidimensional threat model is presented. The threat model accounts for the developmental and operational phases of system evolution and for each phase accounts for both physical and non-physical threats. We describe our team-based method for developing a requirements document and relate that process to techniques in requirements engineering. The system requirements document presented provides a calibration point for future security requirements engineering techniques intended to meet both functional and assurance goals. © 2002 Springer-Verlag London Limited.
引用
收藏
页码:192 / 206
页数:14
相关论文
共 44 条
[1]  
Ware W.H., Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security, (1970)
[2]  
Brinkley D.L., Schell R.R., Concepts and terminology for computer security, Information Security: An Integrated Collection of Essays, pp. 40-97, (1995)
[3]  
Anderson J.P., Computer Security Technology Planning Study, (1972)
[4]  
Myers P., Subversion: The Neglected Aspect of Computer Security, (1980)
[5]  
The Easter Egg Archive, (2000)
[6]  
Thompson K., Reflections on trusting trust, Commun ACM, 27, 8, pp. 761-763, (1984)
[7]  
Karger P.A., Schell R.R., Multics Security Evolution: Vulnerability Analysis, ESD-TR-74-193, 2, (1974)
[8]  
Final Evaluation Report: Boeing Space and Defense Group, (1991)
[9]  
Information Systems Security Products and Service Catalog Supplement, (1992)
[10]  
Final Evaluation Report of Gemini Computers, (1995)