Building Security Requirement Patterns for Increased Effectiven
نویسندگان
چکیده
This paper explores the representation of security concerns and their interactions appropriate for a Model Driven Development approach. The focus is on the representation of the security concerns early in the development process and as abstract forms easily related to the security aspects of the solution requirements, but in a manner that allows for the controlled refinement into a solution. This approach uses UML as a rigorous mechanism to represent the early security concerns and their families of solutions. The security concerns are represented as sets of patterns in UML. Stereotypes and tagged values are used as a mechanism to support requirement traceability during solution development. The traceability mechanisms along with common concepts provide a basis for verifying the adherence of the solution to the requirements. The rigorous nature of UML allows for automatic analysis of imprecise specification earlier in the development process.
منابع مشابه
Modeling and Analyzing Security Patterns Using High Level Petri Nets
Security has become an essential and critical nonfunctional requirement of modern software systems, especially cyber physical systems. Security patterns aim at capturing security expertise in the worked solutions to recurring security design problems. This paper presents an approach to formally model and analyze six security patterns to detect potential incompleteness, inconsistency, and ambigu...
متن کاملProceedings of the Workshop on Security for Web Services and Service-Oriented Architectures
Web Services are regarded as the premier building blocks of Service-Oriented Architectures (SOA). Founding on specifications for basic communication patterns and message syntax, a lot of additional Web Service specifications that address non-functional requirements have been introduced. The most relevant specifications for these non-functional requirements deal with security aspects of Web Serv...
متن کاملMapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملAn Engineering Process and Modelling
This paper presents a novel Security Engineering Process for the creation of security-enhanced system models. The process offers a language for the definition of a domain-specific security knowledge language, the creation of security artefacts using the previous architecture and the use of these artefacts in a system model for fulfilling its security requirements and assurance. It makes securit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005