Building Security Requirement Patterns for Increased Effectiven

نویسندگان

  • Dan Matheson
  • Indrakshi Ray
  • Indrajit Ray
  • Siv Hilde Houmb
چکیده

This paper explores the representation of security concerns and their interactions appropriate for a Model Driven Development approach. The focus is on the representation of the security concerns early in the development process and as abstract forms easily related to the security aspects of the solution requirements, but in a manner that allows for the controlled refinement into a solution. This approach uses UML as a rigorous mechanism to represent the early security concerns and their families of solutions. The security concerns are represented as sets of patterns in UML. Stereotypes and tagged values are used as a mechanism to support requirement traceability during solution development. The traceability mechanisms along with common concepts provide a basis for verifying the adherence of the solution to the requirements. The rigorous nature of UML allows for automatic analysis of imprecise specification earlier in the development process.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modeling and Analyzing Security Patterns Using High Level Petri Nets

Security has become an essential and critical nonfunctional requirement of modern software systems, especially cyber physical systems. Security patterns aim at capturing security expertise in the worked solutions to recurring security design problems. This paper presents an approach to formally model and analyze six security patterns to detect potential incompleteness, inconsistency, and ambigu...

متن کامل

Proceedings of the Workshop on Security for Web Services and Service-Oriented Architectures

Web Services are regarded as the premier building blocks of Service-Oriented Architectures (SOA). Founding on specifications for basic communication patterns and message syntax, a lot of additional Web Service specifications that address non-functional requirements have been introduced. The most relevant specifications for these non-functional requirements deal with security aspects of Web Serv...

متن کامل

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

An Engineering Process and Modelling

This paper presents a novel Security Engineering Process for the creation of security-enhanced system models. The process offers a language for the definition of a domain-specific security knowledge language, the creation of security artefacts using the previous architecture and the use of these artefacts in a system model for fulfilling its security requirements and assurance. It makes securit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005