An Approach: Constructing the Grammar from Security Pattern

نویسندگان

  • Kawin Supaporn
  • Nakornthip Prompoon
  • Thongchai Rojkangsadan
چکیده

Security requirement is one of essential requirements for the currently information system. Since, the system without security is risk to attack or fail. Consequently, stakeholders and developers must concern with security requirements. However, the security requirement is rather difficult to define correctly and completely because it requires experience and knowledge from stakeholders and developers with security background. In order to avoid the miss-configuration of system from requirements that gather from stakeholders. One of alternative solutions is security patterns which are guidance that include security requirements of a common security system. We propose an approach to construct a grammar in an extended-BNF form which helps to create security requirements of a system. A prototyping tool based on our proposed grammar is also presented.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking

Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...

متن کامل

Static Security Constrained Generation Scheduling Using Sensitivity Characteristics of Neural Network

This paper proposes a novel approach for generation scheduling using sensitivitycharacteristic of a Security Analyzer Neural Network (SANN) for improving static securityof power system. In this paper, the potential overloading at the post contingency steadystateassociated with each line outage is proposed as a security index which is used forevaluation and enhancement of system static security....

متن کامل

Constructing cryptographic definitions

This paper mirrors an invited talk to ISCISC 2011. It is not a conventional paper so much as an essay summarizing thoughts on a little-talked-about subject. My goal is to intermix some introspection about definitions with examples of them, these examples drawn mostly from cryptography. Underpinning our discussion are two themes. The first is that definitions are constructed. They are i...

متن کامل

Analysis of residential complexes with the approach of space syntax in terms of mass crime (Case Study: Shiraz Residential complexes)

Various factors affect the degree of mass crime of an environment, including social, economic, and physical factors. The purpose of this research is to investigate the role of the physical components of an environment on mass crime rate. In this regard, open spaces between residential complexes were selected as the case studies and based on five outdoor patterns including linear pattern, disper...

متن کامل

Investigating the Impact of Response Format on the Performance of Grammar Tests: Selected and Constructed

When constructing a test, an initial decision is choosing an appropriate item response format which can be classified as selected or constructed. In large-scale tests where time and finance are of concern, the use of response chosen known as multiple-choice items is quite widespread. This study aimed at investigating the impact of response format on the performance of structure tests. Concurren...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007