Requirements Engineering of an Access Protection

نویسندگان

  • Sharon Friedrich
  • Barbara Paech
چکیده

Access protection is an important requirement for systems, which handle confidential data. This paper describes an approach for the requirements engineering of an access protection using the example of an open system. A major problem of open systems is that many users with different roles access it. Moreover, the open system is connected to the Internet and has ports for connecting hardware like an external storage medium. Therefore, it is easy to steal or misuse confidential data from open systems if access protection is not existent. First, we used Task and Object-Oriented Requirements Engineering (TORE) in order to specify functional requirements on the access protection. For the elicitation of non-functional requirements, we applied Misuse-Oriented Quality Requirements Engineering (MOQARE), on which this paper is focused. Furthermore, we used the German IT-Safety and Security Standard Handbook in order to ensure the completeness of the solution requirements. For consideration of architectural requirements, we used Integrated Conflict Resolution and Architectural Design (ICRAD). It allows to analyze which design can realize which requirements and therefore to identify the most suitable one. Combining these three requirements engineering methods ensured a complete and appropriate solution.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Water quality zoning of Vishwamitri River to access environmental flow requirements through aggregation of water quality index

Environmental flow requirements, to maintain the functioning of freshwater-dependent ecosystems and restore rivers in ecologically acceptable conditions, depend upon the present water quality status of the river. Various stretches of Vishwamitri River vary in quality and quantity. Water quality index is a tool to converse information regarding water quality of various stretches of river and can...

متن کامل

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach

Privacy protection is a growing concern in the marketplace. Yet, privacy requirements and mechanisms are usually retro-fitted into a pre-existing design which may not be able to accommodate them due to potential conflicts with functional requirements. We propose a procedure for automatically extracting privacy requirements from databases supporting access control mechanisms for personal data (h...

متن کامل

Zone-3 Impadance Reach Setting of Distance Relays by Including In-feed Current Effects in an Adaptive Scheme

The undesired operation of zone 3 may be one of the most conspicuous protective relay features due to the incorrect zone 3 relay operations which have been conducive to the severity of blackouts. Therefore, determining the accurate zone 3 setting of the distance relay is deemed to be necessary. This paper focuses on the development of a new technique for calculating zone-3 setting of distance r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009