Designing Security Requirements - A Flexible, Balanced, and Threshold-Based Approach
نویسنده
چکیده
Defining security requirements is the important first step in designing, implementing and evaluating a secure system. In this paper, we propose a formal approach for designing security requirements, which is flexible for a user to express his/her security requirements with different levels of details and for the system developers to take different options to design and implement the system to satisfy the user’s requirements. The proposed approach also allows the user to balance the required system security properties and some unfavorable features (e.g., performance degrading due to tight control and strong security). Given the importance of social-technical factors in information security, the proposed approach also incorporates economic and organizational security management factors in specifying user’s security requirements. We demonstrate the application of our approach with the help of a concrete pervasive information system.
منابع مشابه
On the design and security of a lattice-based threshold secret sharing scheme
In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...
متن کاملDesigning a Bank-Based Flexible Performance Evaluation System (Study: Bank Shahr)
Given the limitations of the existing performance evaluation models for organizations with dynamic internal and external conditions, this study aims to provide a flexible performance evaluation model with adaptability to intra- and extra-organizational changes. The present study first forms a database of criteria related to banking activities. After gathering the experts' opinions, we select 2...
متن کاملMapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملDesigning a local Flexible Model for Electronic Systems Acquisition Based on Systems Engineering, Case Study: Electronic high-tech Industrial
In this research we have presented a local model for implementing systems engineering activities in optimized acquisition of electronic systems in Electronic High-Tech Industrial. In this regard, after reviewing the literature and the use of documents, articles and Latin books, we have collected system acquisition life cycle models from different resources. after considering the criteria of the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011