An Approach: Constructing the Grammar from Security Pattern
نویسندگان
چکیده
Security requirement is one of essential requirements for the currently information system. Since, the system without security is risk to attack or fail. Consequently, stakeholders and developers must concern with security requirements. However, the security requirement is rather difficult to define correctly and completely because it requires experience and knowledge from stakeholders and developers with security background. In order to avoid the miss-configuration of system from requirements that gather from stakeholders. One of alternative solutions is security patterns which are guidance that include security requirements of a common security system. We propose an approach to construct a grammar in an extended-BNF form which helps to create security requirements of a system. A prototyping tool based on our proposed grammar is also presented.
منابع مشابه
Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking
Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...
متن کاملStatic Security Constrained Generation Scheduling Using Sensitivity Characteristics of Neural Network
This paper proposes a novel approach for generation scheduling using sensitivitycharacteristic of a Security Analyzer Neural Network (SANN) for improving static securityof power system. In this paper, the potential overloading at the post contingency steadystateassociated with each line outage is proposed as a security index which is used forevaluation and enhancement of system static security....
متن کاملConstructing cryptographic definitions
This paper mirrors an invited talk to ISCISC 2011. It is not a conventional paper so much as an essay summarizing thoughts on a little-talked-about subject. My goal is to intermix some introspection about definitions with examples of them, these examples drawn mostly from cryptography. Underpinning our discussion are two themes. The first is that definitions are constructed. They are i...
متن کاملAnalysis of residential complexes with the approach of space syntax in terms of mass crime (Case Study: Shiraz Residential complexes)
Various factors affect the degree of mass crime of an environment, including social, economic, and physical factors. The purpose of this research is to investigate the role of the physical components of an environment on mass crime rate. In this regard, open spaces between residential complexes were selected as the case studies and based on five outdoor patterns including linear pattern, disper...
متن کاملInvestigating the Impact of Response Format on the Performance of Grammar Tests: Selected and Constructed
When constructing a test, an initial decision is choosing an appropriate item response format which can be classified as selected or constructed. In large-scale tests where time and finance are of concern, the use of response chosen known as multiple-choice items is quite widespread. This study aimed at investigating the impact of response format on the performance of structure tests. Concurren...
متن کامل