Ensuring compliance between policies, requirements and software design: a case study

Q. He, Paul N. Otto, A. Antón, Laurie A. Jones
{"title":"Ensuring compliance between policies, requirements and software design: a case study","authors":"Q. He, Paul N. Otto, A. Antón, Laurie A. Jones","doi":"10.1109/IWIA.2006.7","DOIUrl":null,"url":null,"abstract":"Specifying correct and complete access control policies is essential to secure data and ensure privacy in information systems. Traditionally, policy specification has not been an explicit part of the software development process. This isolation of policy specification from software development often results in policies that are not in compliance with system requirements and/or organizational security and privacy policies, leaving the system vulnerable to data breaches. This paper presents the results and lessons learned from a case study that employs the Requirements-based Access Control Analysis and Policy Specification (ReCAPS) method to specify access control policies for a Web-based event registration system. The ReCAPS method aids software and security engineers in specifying access control policies derived from requirements specifications and other available sources. Our case study revealed that the ReCAPS method helps identify inconsistencies across various software artifacts, such as requirements specification, database design, and organizational security and privacy policies. Had these problems not been identified and resolved, they would have crippled later phases of software development, resulted in missing or incomplete system functionality, and compromised the system's security and privacy. This case study reinforces, validates, and extends our previous recommendations that access control policy specification should be an integral part of the software development process for information systems to achieve information assurance and improve the quality of the information system","PeriodicalId":156960,"journal":{"name":"Fourth IEEE International Workshop on Information Assurance (IWIA'06)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Fourth IEEE International Workshop on Information Assurance (IWIA'06)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWIA.2006.7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 18

Abstract

Specifying correct and complete access control policies is essential to secure data and ensure privacy in information systems. Traditionally, policy specification has not been an explicit part of the software development process. This isolation of policy specification from software development often results in policies that are not in compliance with system requirements and/or organizational security and privacy policies, leaving the system vulnerable to data breaches. This paper presents the results and lessons learned from a case study that employs the Requirements-based Access Control Analysis and Policy Specification (ReCAPS) method to specify access control policies for a Web-based event registration system. The ReCAPS method aids software and security engineers in specifying access control policies derived from requirements specifications and other available sources. Our case study revealed that the ReCAPS method helps identify inconsistencies across various software artifacts, such as requirements specification, database design, and organizational security and privacy policies. Had these problems not been identified and resolved, they would have crippled later phases of software development, resulted in missing or incomplete system functionality, and compromised the system's security and privacy. This case study reinforces, validates, and extends our previous recommendations that access control policy specification should be an integral part of the software development process for information systems to achieve information assurance and improve the quality of the information system
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
确保策略、需求和软件设计之间的遵从性:一个案例研究
在信息系统中,制定正确、完整的访问控制策略是保证数据安全、保护隐私的关键。传统上,策略规范并不是软件开发过程中明确的一部分。这种将策略规范与软件开发隔离开来的做法通常会导致策略不符合系统需求和/或组织安全和隐私策略,从而使系统容易受到数据泄露的影响。本文介绍了一个案例研究的结果和经验教训,该案例研究使用基于需求的访问控制分析和策略规范(ReCAPS)方法为基于web的事件注册系统指定访问控制策略。ReCAPS方法帮助软件和安全工程师指定来自需求规范和其他可用资源的访问控制策略。我们的案例研究表明,ReCAPS方法有助于识别各种软件工件之间的不一致性,例如需求规范、数据库设计以及组织安全性和隐私策略。如果这些问题没有被识别和解决,它们将会削弱软件开发的后期阶段,导致丢失或不完整的系统功能,并危及系统的安全性和隐私。本案例研究加强、验证并扩展了我们之前的建议,即访问控制策略规范应该是信息系统软件开发过程的一个组成部分,以实现信息保证并提高信息系统的质量
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An intelligent detection and response strategy to false positives and network attacks Modeling and execution of complex attack scenarios using interval timed colored Petri nets Active event correlation in Bro IDS to detect multi-stage attacks The LAIDS/LIDS framework for systematic IPS design An application of information theory to intrusion detection
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1