Academia.eduAcademia.edu

Outline

Computer Aided Threat Identification

2011

Abstract

Abstract Recently, there has been an increase of reported security threats hitting organizations. Some of them are originated from the assignments to users of inappropriate permissions on organizational sensitive data. Thus it is crucial for organizations to recognize as early as possible the risks deriving by inappropriate access right management and to identify the solutions that they need to prevent such risks.

References (14)

  1. F. Massacci, J. Mylopoulos, and N. Zannone, "Security Requirements Engineering : The SI * Modeling Language and the Secure Tropos Methodology," in Advances in In- telligent Information Systems, ser. Studies in Computational Intelligence, Z. Ras and L.-S. Tsay, Eds. Springer Berlin / Heidelberg, 2010, vol. 265, pp. 147-174.
  2. A. Van Lamsweerde, "Elaborating security requirements by construction of intentional anti-models," Proceedings. 26th International Conference on Software Engineering, pp. 148- 157, 2004.
  3. L. Liu, E. Yu, and J. Mylopoulos, "Security and privacy requirements analysis within a social setting," Proc.of RE, vol. 3, pp. 151-161, 2003.
  4. G. Elahi, E. Yu, and N. Zannone, "A vulnerability-centric requirements engineering framework: analyzing security at- tacks, countermeasures, and requirements based on vulnera- bilities," Requirements Engineering, vol. 15, no. 1, pp. 41-62, Nov. 2009.
  5. Y. Asnar, P. Giorgini, and J. Mylopoulos, "Goal-driven risk assessment in requirements engineering," Requirements Engi- neering, vol. 16, no. 2, pp. 101-116, 2011.
  6. E. Yu, "Modelling strategic relationships for process reengi- neering," Ph.D. dissertation, University of Toronto, Canada, 1995.
  7. P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone, "Modeling security requirements through ownership, permis- sion and delegation," in Engineering, 2005. Proceedings. 13th IEEE International Conference on, no. July. IEEE, 2005, pp. 167-176.
  8. Y. Asnar, R. Bonato, P. Giorgini, F. Massacci, V. Meduri, C. Riccucci, and A. Saidane, "Secure and Dependable Pat- terns in Organizations: An Empirical Approach," in Require- ments Engineering, 2007. Proceedings. 15th IEEE Interna- tional Conference on, 2007.
  9. T. Dell'Armi, W. Faber, G. Ielpa, N. Leone, and G. Pfeifer, "Aggregate functions in disjunctive logic programming: Se- mantics,complexity,and implementation in dlv," in Proceed- ings of the 18th International Joint Conference on Artificial Intelligence (IJCAI) 2003. Elsevier Science Publishers, 2003, pp. 847-852.
  10. K. Yskout, R. Scandariato, B. De Win, and W. Joosen, "Transforming security requirements into architecture," in Third International Conference on Availability, Reliability and Security, 2008. ARES 08. IEEE, Mar. 2008, pp. 1421- 1428.
  11. A. Van Lamsweerde and E. Letier, "Handling obstacles in goal-oriented requirements engineering," IEEE Transactions on Software Engineering, vol. 26, no. 10, pp. 978-1005, 2000.
  12. T. Li, L. Liu, and B. R. Bryant, "Service Security Analysis Based on i*: An Approach from the Attacker Viewpoint," in Security, Trust, and Privacy for Software Applications (STPSA 2010), Seoul, 2010, pp. 127-133.
  13. N. Mayer, P. Heymans, and R. Matulevicius, "Design of a modelling language for information system security risk man- agement," in Proceedings of the 1st International Conference on Research Challenges in Information Science (RCIS 2007), 2007, p. 121-131.
  14. M. S. Lund, B. Solhaug, and K. Stolen, Model-Driven Risk Analysis -The CORAS Approach. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.