首页 > 最新文献

2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)最新文献

英文 中文
Pattern-based and ISO 27001 compliant risk analysis for cloud systems 基于模式和符合ISO 27001标准的云系统风险分析
A. Alebrahim, Denis Hatebur, Ludger Goeke
For accepting clouds and using cloud services by companies, security plays a decisive role. For cloud providers, one way to obtain customers' confidence is to establish security mechanisms when using clouds. The ISO 27001 standard provides general concepts for establishing information security in an organization. Risk analysis is an essential part in the ISO 27001 standard for achieving information security. This standard, however, contains ambiguous descriptions. In addition, it does not stipulate any method to identify assets, threats, and vulnerabilities. In this paper, we present a structured and pattern-based method to conduct risk analysis for cloud computing systems. It is tailored to SMEs. Our method addresses the requirements of the ISO 27001. We make use of the cloud system analysis pattern, security requirement patterns, threat patterns, and control patterns for conducting the risk analysis. The method is illustrated by a cloud logistics application example.
企业接受云,使用云服务,安全起着决定性的作用。对于云提供商来说,在使用云时建立安全机制是获得客户信任的一种方式。ISO 27001标准提供了在组织中建立信息安全的一般概念。风险分析是ISO 27001标准中实现信息安全的重要组成部分。然而,这个标准包含了模棱两可的描述。此外,它没有规定任何识别资产、威胁和漏洞的方法。在本文中,我们提出了一种结构化和基于模式的方法来对云计算系统进行风险分析。它是为中小企业量身定制的。我们的方法符合ISO 27001的要求。我们利用云系统分析模式、安全需求模式、威胁模式和控制模式进行风险分析。通过一个云物流应用实例说明了该方法的有效性。
{"title":"Pattern-based and ISO 27001 compliant risk analysis for cloud systems","authors":"A. Alebrahim, Denis Hatebur, Ludger Goeke","doi":"10.1109/ESPRE.2014.6890527","DOIUrl":"https://doi.org/10.1109/ESPRE.2014.6890527","url":null,"abstract":"For accepting clouds and using cloud services by companies, security plays a decisive role. For cloud providers, one way to obtain customers' confidence is to establish security mechanisms when using clouds. The ISO 27001 standard provides general concepts for establishing information security in an organization. Risk analysis is an essential part in the ISO 27001 standard for achieving information security. This standard, however, contains ambiguous descriptions. In addition, it does not stipulate any method to identify assets, threats, and vulnerabilities. In this paper, we present a structured and pattern-based method to conduct risk analysis for cloud computing systems. It is tailored to SMEs. Our method addresses the requirements of the ISO 27001. We make use of the cloud system analysis pattern, security requirement patterns, threat patterns, and control patterns for conducting the risk analysis. The method is illustrated by a cloud logistics application example.","PeriodicalId":274809,"journal":{"name":"2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125640072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Supporting evolving security models for an agile security evaluation 支持不断发展的安全模型,以实现敏捷的安全评估
Wolfgang Raschke, Massimiliano Zilli, Philip Baumgartner, Johannes Loinig, C. Steger, Christian Kreiner
At present, security-related engineering usually requires a big up-front design (BUFD) regarding security requirements and security design. In addition to the BUFD, at the end of the development, a security evaluation process can take up to several months. In today's volatile markets customers want to influence the software design during the development process. Agile processes have proven to support these demands. Nevertheless, there is a clash with traditional security design and evaluation processes. In this paper, we propose an agile security evaluation method for the Common Criteria standard. This method is complemented by an implementation of a change detection analysis for model-based security requirements. This system facilitates the agile security evaluation process to a high degree.
目前,与安全相关的工程通常需要对安全需求和安全设计进行大的预先设计(BUFD)。除了BUFD之外,在开发结束时,安全评估过程可能需要长达几个月的时间。在当今多变的市场中,客户希望在开发过程中影响软件设计。敏捷过程已经被证明能够支持这些需求。然而,这与传统的安全设计和评估过程存在冲突。本文针对通用准则标准提出了一种敏捷的安全评估方法。此方法由基于模型的安全需求的变更检测分析的实现来补充。该系统在很大程度上促进了敏捷安全评估过程。
{"title":"Supporting evolving security models for an agile security evaluation","authors":"Wolfgang Raschke, Massimiliano Zilli, Philip Baumgartner, Johannes Loinig, C. Steger, Christian Kreiner","doi":"10.1109/ESPRE.2014.6890525","DOIUrl":"https://doi.org/10.1109/ESPRE.2014.6890525","url":null,"abstract":"At present, security-related engineering usually requires a big up-front design (BUFD) regarding security requirements and security design. In addition to the BUFD, at the end of the development, a security evaluation process can take up to several months. In today's volatile markets customers want to influence the software design during the development process. Agile processes have proven to support these demands. Nevertheless, there is a clash with traditional security design and evaluation processes. In this paper, we propose an agile security evaluation method for the Common Criteria standard. This method is complemented by an implementation of a change detection analysis for model-based security requirements. This system facilitates the agile security evaluation process to a high degree.","PeriodicalId":274809,"journal":{"name":"2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)","volume":"103 24","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113945917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Towards a framework to measure security expertise in requirements analysis 建立一个框架来衡量需求分析中的安全专家
Hanan Hibshi, T. Breaux, M. Riaz, L. Williams
Research shows that commonly accepted security requirements are not generally applied in practice. Instead of relying on requirements checklists, security experts rely on their expertise and background knowledge to identify security vulnerabilities. To understand the gap between available checklists and practice, we conducted a series of interviews to encode the decision-making process of security experts and novices during security requirements analysis. Participants were asked to analyze two types of artifacts: source code, and network diagrams for vulnerabilities and to apply a requirements checklist to mitigate some of those vulnerabilities. We framed our study using Situation Awareness-a cognitive theory from psychology-to elicit responses that we later analyzed using coding theory and grounded analysis. We report our preliminary results of analyzing two interviews that reveal possible decision-making patterns that could characterize how analysts perceive, comprehend and project future threats which leads them to decide upon requirements and their specifications, in addition, to how experts use assumptions to overcome ambiguity in specifications. Our goal is to build a model that researchers can use to evaluate their security requirements methods against how experts transition through different situation awareness levels in their decision-making process.
研究表明,普遍接受的安全需求在实践中并没有得到普遍应用。安全专家不是依靠需求检查表,而是依靠他们的专业知识和背景知识来识别安全漏洞。为了理解可用的检查表和实践之间的差距,我们进行了一系列的访谈,以便在安全需求分析期间对安全专家和新手的决策过程进行编码。参与者被要求分析两种类型的工件:源代码和漏洞的网络图,并应用需求检查表来减轻其中的一些漏洞。我们使用情境意识(一种来自心理学的认知理论)来构建我们的研究框架,以引出我们随后使用编码理论和基础分析进行分析的反应。我们报告了分析两次访谈的初步结果,这些访谈揭示了可能的决策模式,这些模式可以表征分析师如何感知、理解和预测未来的威胁,从而导致他们决定需求及其规格,此外,专家如何使用假设来克服规格中的模糊性。我们的目标是建立一个模型,研究人员可以用它来评估他们的安全需求方法,以及专家在决策过程中如何通过不同的情况感知水平进行转换。
{"title":"Towards a framework to measure security expertise in requirements analysis","authors":"Hanan Hibshi, T. Breaux, M. Riaz, L. Williams","doi":"10.1109/ESPRE.2014.6890522","DOIUrl":"https://doi.org/10.1109/ESPRE.2014.6890522","url":null,"abstract":"Research shows that commonly accepted security requirements are not generally applied in practice. Instead of relying on requirements checklists, security experts rely on their expertise and background knowledge to identify security vulnerabilities. To understand the gap between available checklists and practice, we conducted a series of interviews to encode the decision-making process of security experts and novices during security requirements analysis. Participants were asked to analyze two types of artifacts: source code, and network diagrams for vulnerabilities and to apply a requirements checklist to mitigate some of those vulnerabilities. We framed our study using Situation Awareness-a cognitive theory from psychology-to elicit responses that we later analyzed using coding theory and grounded analysis. We report our preliminary results of analyzing two interviews that reveal possible decision-making patterns that could characterize how analysts perceive, comprehend and project future threats which leads them to decide upon requirements and their specifications, in addition, to how experts use assumptions to overcome ambiguity in specifications. Our goal is to build a model that researchers can use to evaluate their security requirements methods against how experts transition through different situation awareness levels in their decision-making process.","PeriodicalId":274809,"journal":{"name":"2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)","volume":"273 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115284845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
L-SQUARE: Preliminary extension of the SQUARE methodology to address legal compliance L-SQUARE: SQUARE方法的初步扩展,以解决法律遵从问题
Aaron Alva, Lisa R. Young
Laws and regulations must be considered in the requirements engineering process to help ensure legal compliance when developing software or engineering systems. To incorporate legal compliance considerations into the requirements engineering process, we introduce a preliminary extension of the SQUARE methodology, called L-SQUARE. In this paper, we develop L-SQUARE by discussing legal compliance concerns at each of the traditional nine steps in SQUARE. Then, we link existing research in requirements engineering and the law to each step, emphasizing where compliance concerns can be addressed. This preliminary extension of SQUARE sets existing research into an established methodology for requirements engineering, creating a framework for situating current research in legal compliance, and identifying gaps for future work.
在开发软件或工程系统时,必须在需求工程过程中考虑法律和法规,以帮助确保法律遵从性。为了将法律遵从性考虑合并到需求工程过程中,我们引入了SQUARE方法的初步扩展,称为L-SQUARE。在本文中,我们通过讨论SQUARE中传统九个步骤中的每个步骤的法律遵从性问题来开发L-SQUARE。然后,我们将需求工程和法律中的现有研究与每个步骤联系起来,强调在哪里可以处理遵从性问题。SQUARE的这个初步扩展将现有的研究设置为需求工程的既定方法,创建了一个框架,用于将当前的研究置于法律遵从性中,并为未来的工作确定差距。
{"title":"L-SQUARE: Preliminary extension of the SQUARE methodology to address legal compliance","authors":"Aaron Alva, Lisa R. Young","doi":"10.1109/ESPRE.2014.6890524","DOIUrl":"https://doi.org/10.1109/ESPRE.2014.6890524","url":null,"abstract":"Laws and regulations must be considered in the requirements engineering process to help ensure legal compliance when developing software or engineering systems. To incorporate legal compliance considerations into the requirements engineering process, we introduce a preliminary extension of the SQUARE methodology, called L-SQUARE. In this paper, we develop L-SQUARE by discussing legal compliance concerns at each of the traditional nine steps in SQUARE. Then, we link existing research in requirements engineering and the law to each step, emphasizing where compliance concerns can be addressed. This preliminary extension of SQUARE sets existing research into an established methodology for requirements engineering, creating a framework for situating current research in legal compliance, and identifying gaps for future work.","PeriodicalId":274809,"journal":{"name":"2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129274828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Argumentation-based security requirements elicitation: The next round 基于论证的安全需求引出:下一轮
D. Ionita, Jan-Willem Bullee, R. Wieringa
Information Security Risk Assessment can be viewed as part of requirements engineering because it is used to translate security goals into security requirements, where security requirements are the desired system properties that mitigate threats to security goals. To improve the defensibility of these mitigations, several researchers have attempted to base risk assessment on argumentation structures. However, none of these approaches have so far been scalable or usable in real-world risk assessments. In this paper, we present the results from our search for a scalable argumentation-based information security RA method. We start from previous work on both formal argumentation frameworks and informal argument structuring and try to find a promising middle ground. An initial prototype using spreadsheets is validated and iteratively improved via several Case Studies. Challenges such as scalability, quantify-ability, ease of use, and relation to existing work in parallel fields are discussed. Finally, we explore the scope and applicability of our approach with regard to various classes of Information Systems while also drawing more general conclusions on the role of argumentation in security.
信息安全风险评估可以被视为需求工程的一部分,因为它用于将安全目标转换为安全需求,其中安全需求是减轻对安全目标的威胁的所需系统属性。为了提高这些缓解措施的可辩护性,一些研究人员试图将风险评估建立在论证结构的基础上。然而,到目前为止,这些方法都没有可扩展或可用于现实世界的风险评估。在本文中,我们展示了我们对可扩展的基于论证的信息安全RA方法的搜索结果。我们从之前关于正式论证框架和非正式论证结构的工作开始,并试图找到一个有希望的中间立场。使用电子表格的初始原型通过几个案例研究进行验证和迭代改进。讨论了诸如可扩展性、可量化性、易用性以及与并行领域中现有工作的关系等挑战。最后,我们探讨了我们的方法的范围和适用性,涉及到各种类型的信息系统,同时也得出了更多关于论证在安全中的作用的一般性结论。
{"title":"Argumentation-based security requirements elicitation: The next round","authors":"D. Ionita, Jan-Willem Bullee, R. Wieringa","doi":"10.1109/ESPRE.2014.6890521","DOIUrl":"https://doi.org/10.1109/ESPRE.2014.6890521","url":null,"abstract":"Information Security Risk Assessment can be viewed as part of requirements engineering because it is used to translate security goals into security requirements, where security requirements are the desired system properties that mitigate threats to security goals. To improve the defensibility of these mitigations, several researchers have attempted to base risk assessment on argumentation structures. However, none of these approaches have so far been scalable or usable in real-world risk assessments. In this paper, we present the results from our search for a scalable argumentation-based information security RA method. We start from previous work on both formal argumentation frameworks and informal argument structuring and try to find a promising middle ground. An initial prototype using spreadsheets is validated and iteratively improved via several Case Studies. Challenges such as scalability, quantify-ability, ease of use, and relation to existing work in parallel fields are discussed. Finally, we explore the scope and applicability of our approach with regard to various classes of Information Systems while also drawing more general conclusions on the role of argumentation in security.","PeriodicalId":274809,"journal":{"name":"2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117202236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Using malware analysis to improve security requirements on future systems 使用恶意软件分析来改进未来系统的安全需求
Naney R. Mead, J. Morales
In this position paper, we propose to enhance current software development lifecycle models by including use cases, based on previous cyberattacks and their associated malware, and to propose an open research question: Are specific types of systems prone to specific classes of malware exploits? If this is the case, developers can create future systems that are more secure, from inception, by including use cases that address previous attacks.
在这篇意见书中,我们建议通过包括用例来增强当前的软件开发生命周期模型,基于以前的网络攻击及其相关的恶意软件,并提出一个开放的研究问题:特定类型的系统是否容易受到特定类别的恶意软件攻击?如果是这种情况,开发人员可以通过包含处理先前攻击的用例,从一开始就创建更安全的未来系统。
{"title":"Using malware analysis to improve security requirements on future systems","authors":"Naney R. Mead, J. Morales","doi":"10.1109/ESPRE.2014.6890526","DOIUrl":"https://doi.org/10.1109/ESPRE.2014.6890526","url":null,"abstract":"In this position paper, we propose to enhance current software development lifecycle models by including use cases, based on previous cyberattacks and their associated malware, and to propose an open research question: Are specific types of systems prone to specific classes of malware exploits? If this is the case, developers can create future systems that are more secure, from inception, by including use cases that address previous attacks.","PeriodicalId":274809,"journal":{"name":"2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124405069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Engineering privacy requirements valuable lessons from another realm 隐私工程需要从另一个领域获得宝贵的经验
Y. Martín, J. D. Álamo, J. Yelmo
The Privacy by Design approach to systems engineering introduces privacy requirements in the early stages of development, instead of patching up a built system afterwards. However, `vague', `disconnected from technology', or `aspirational' are some terms employed nowadays to refer to the privacy principles which must lead the development process. Although privacy has become a first-class citizen in the realm of non-functional requirements and some methodological frameworks help developers by providing design guidance, software engineers often miss a solid reference detailing which specific, technical requirements they must abide by, and a systematic methodology to follow. In this position paper, we look into a domain that has already successfully tackled these problems - web accessibility -, and propose translating their findings into the realm of privacy requirements engineering, analyzing as well the gaps not yet covered by current privacy initiatives.
系统工程的隐私设计方法在开发的早期阶段引入隐私需求,而不是在之后修补已构建的系统。然而,“模糊的”、“与技术脱节的”或“雄心勃勃的”是当今用来指代必须引导开发过程的隐私原则的一些术语。尽管隐私已经成为非功能需求领域的一等公民,并且一些方法框架通过提供设计指导来帮助开发人员,但软件工程师经常缺少一个详细说明他们必须遵守的具体技术需求的可靠参考,以及一个要遵循的系统方法。在本文中,我们着眼于一个已经成功解决了这些问题的领域——网页可访问性,并建议将他们的发现转化为隐私需求工程的领域,同时分析当前隐私倡议尚未涵盖的差距。
{"title":"Engineering privacy requirements valuable lessons from another realm","authors":"Y. Martín, J. D. Álamo, J. Yelmo","doi":"10.1109/ESPRE.2014.6890523","DOIUrl":"https://doi.org/10.1109/ESPRE.2014.6890523","url":null,"abstract":"The Privacy by Design approach to systems engineering introduces privacy requirements in the early stages of development, instead of patching up a built system afterwards. However, `vague', `disconnected from technology', or `aspirational' are some terms employed nowadays to refer to the privacy principles which must lead the development process. Although privacy has become a first-class citizen in the realm of non-functional requirements and some methodological frameworks help developers by providing design guidance, software engineers often miss a solid reference detailing which specific, technical requirements they must abide by, and a systematic methodology to follow. In this position paper, we look into a domain that has already successfully tackled these problems - web accessibility -, and propose translating their findings into the realm of privacy requirements engineering, analyzing as well the gaps not yet covered by current privacy initiatives.","PeriodicalId":274809,"journal":{"name":"2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123153175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoring 使用决策文档、启发式和用户监视的半自动安全需求工程和演进
Tom-Michael Hesse, Stefan Gärtner, T. Roehm, B. Paech, K. Schneider, B. Brügge
Security issues can have a significant negative impact on the business or reputation of an organization. In most cases they are not identified in requirements and are not continuously monitored during software evolution. Therefore, the inability of a system to conform to regulations or its endangerment by new vulnerabilities is not recognized. In consequence, decisions related to security might not be taken at all or become obsolete quickly. But to evaluate efficiently whether an issue is already addressed appropriately, software engineers need explicit decision documentation. Often, such documentation is not performed due to high overhead. To cope with this problem, we propose to document decisions made to address security requirements. To lower the manual effort, information from heuristic analysis and end user monitoring is incorporated. The heuristic assessment method is used to identify security issues in given requirements automatically. This helps to uncover security decisions needed to mitigate those issues. We describe how the corresponding security knowledge for each issue can be incorporated into the decision documentation semiautomatically. In addition, violations of security requirements at runtime are monitored. We show how decisions related to those security requirements can be identified through the documentation and updated manually. Overall, our approach improves the quality and completeness of security decision documentation to support the engineering and evolution of security requirements.
安全问题可能对企业的业务或声誉产生重大的负面影响。在大多数情况下,它们没有在需求中被识别,并且在软件开发过程中没有被持续监控。因此,没有认识到系统无法符合规则或受到新的脆弱性的危害。因此,与安全性相关的决策可能根本不会被采纳,或者很快就会过时。但是为了有效地评估一个问题是否已经得到了适当的解决,软件工程师需要明确的决策文档。通常,由于高开销,不会执行此类文档。为了处理这个问题,我们建议记录为处理安全需求而做出的决策。为了降低人工工作量,从启发式分析和最终用户监控中获得的信息被合并。采用启发式评估方法自动识别给定需求中的安全问题。这有助于发现缓解这些问题所需的安全决策。我们描述了如何将每个问题的相应安全知识半自动地纳入决策文档。此外,在运行时对违反安全需求的行为进行监视。我们将展示如何通过文档识别和手动更新与这些安全需求相关的决策。总的来说,我们的方法提高了安全决策文档的质量和完整性,以支持安全需求的工程和演进。
{"title":"Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoring","authors":"Tom-Michael Hesse, Stefan Gärtner, T. Roehm, B. Paech, K. Schneider, B. Brügge","doi":"10.1109/ESPRE.2014.6890520","DOIUrl":"https://doi.org/10.1109/ESPRE.2014.6890520","url":null,"abstract":"Security issues can have a significant negative impact on the business or reputation of an organization. In most cases they are not identified in requirements and are not continuously monitored during software evolution. Therefore, the inability of a system to conform to regulations or its endangerment by new vulnerabilities is not recognized. In consequence, decisions related to security might not be taken at all or become obsolete quickly. But to evaluate efficiently whether an issue is already addressed appropriately, software engineers need explicit decision documentation. Often, such documentation is not performed due to high overhead. To cope with this problem, we propose to document decisions made to address security requirements. To lower the manual effort, information from heuristic analysis and end user monitoring is incorporated. The heuristic assessment method is used to identify security issues in given requirements automatically. This helps to uncover security decisions needed to mitigate those issues. We describe how the corresponding security knowledge for each issue can be incorporated into the decision documentation semiautomatically. In addition, violations of security requirements at runtime are monitored. We show how decisions related to those security requirements can be identified through the documentation and updated manually. Overall, our approach improves the quality and completeness of security decision documentation to support the engineering and evolution of security requirements.","PeriodicalId":274809,"journal":{"name":"2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128988843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1