A reuse-based approach to determining security requirements
2003, Proceedings of the 9th international workshop on requirements engineering: foundation for software quality (REFSQ’03), Klagenfurt, Austria
Abstract
The paper proposes a reuse-based approach to determining security requirements. Development for reuse involves identifying security threats and associated security requirements during application development and abstracting them into a repository of generic threats and requirements. Development with reuse involves identifying security assets, setting security goals for each asset, identifying threats to each goal, analysing risks and determining security requirements, based on reuse of generic threats and ...
References (38)
- I. Jacobson, M. Christerson, P. Jonsson, and G. Overgaard, Object-Oriented Software Engineering: A Use Case Driven Approach. Boston: Addison-Wesley, 1992.
- L. L. Constantine and L. A. D. Lockwood, Software for Use: A Practical Guide to the Models and Methods of Usage- Centered Design: ACM Press, 1999.
- A. Cockburn, Writing Effective Use Cases. Boston: Addison-Wesley, 2001.
- J. Rumbaugh, "Getting Started: Using use cases to capture requirements," Journal of Object-Oriented Programming, pp. 8- 23, 1994.
- D. Kulak and E. Guiney, Use Cases: Requirements in Context: ACM Press, 2000.
- K. Weidenhaupt, K. Pohl, M. Jarke, and P. Haumer, "Scenario Usage in System Development: A Report on Current Practice," IEEE Software, vol. 15, pp. 34-45, 1998.
- G. Sindre and A. L. Opdahl, "Eliciting Security Requirements by Misuse Cases," presented at TOOLS Pacific 2000, Sydney, 2000.
- G. Sindre and A. L. Opdahl, "Templates for Misuse Cases," presented at REFSQ'2001, Interlaken, 2001.
- G. Sindre, A. L. Opdahl, and G. F. Breivik, "Generalization/Specialization as a Structuring Mechanism for Misuse Cases," presented at 2nd Symposium on Requirements Engineering for Information Security, Raleigh, NC, 2002.
- I. F. Alexander, "Initial Industrial Experience of Misuse Cases in Trade-Off Analysis," presented at RE'02, Essen, 2002.
- I. F. Alexander, "Misuse Cases, Use Cases with Hostile Intent," IEEE Software, vol. 20, pp. 58-66, 2003.
- J. McDermott, "Abuse-Case-Based Assurance
- Arguments," presented at 17th Annual Computer Security Applications Conference (ACSAC'01), 2001.
- I. F. Alexander, "Modelling the Interplay of Conflicting Goals with Use and Misuse Cases," presented at 8th International Workshop on Requirements Engineering: Foundation for Software Quality, Essen, Germany, 2002.
- J. McDermott and C. Fox, "Using Abuse Case Models for Security Requirements Analysis," presented at 15th Annual Computer Security Applications Conference (ACSAC'99), 1999.
- D. Firesmith, "Security Use Cases," Journal of Object Technology, vol. 2, pp. 53-64, 2003.
- R. Crook, D. Ince, L. Lin, and B. Nuseibeh, "Security Requirements Engineering: When Anti-Requirements Hit the Fan," presented at IEEE International Requirements Engineering Conference (RE'02), Essen, Germany, 2002.
- D. Firesmith, "Engineering Security Requirements," Journal of Object Technology, vol. 2, pp. 53-68, 2003.
- A. I. Anton, R. A. Carter, A. Dagnino, J. H. Dempster, and D. F. Siege, "Deriving Goals from a Use Case Based Requirements Specification," Requirements Engineering Journal, vol. 6, pp. 63-73, 2001.
- A. I. Anton and J. B. Earp, "Strategies for Developing Policies and Requirements for Secure Electronic Commerce Systems," presented at 1st ACM Workshop on Security and Privacy in E-Commerce, 2000.
- T. Biggerstaff and C. Richter, "Reusability Framework, Assessment and Directions," IEEE Software, vol. 4, pp. 41-49, 1987.
- A. van Lamsweerde, "Requirements Engineering in the Year 00: A Research Perspective," presented at ICSE'2000, Limerick, Ireland, 2000.
- M. Mannion, B. Keepence, H. Kaindl, and J. Wheadon, "Reusing Single System Requirements from Application Family Requirements," presented at ICSE'99, Los Angeles, CA, 1999.
- R. R. Lutz, "Towards Safe Reuse of Product Family Specifications," presented at SSR'99, Los Angeles, CA, 1999.
- M. Daneva, "Measuring Reuse of SAP Requirements: a Model-based Approach," presented at SSR'99, Los Angeles, CA, 1999.
- E.-A. Karlsson, "Software Reuse: A Holistic Approach," in Wiley Series in Software Based Systems: John Wiley & Sons, 1995.
- G. Sindre, R. Conradi, and E.-A. Karlsson, "The REBOOT Approach to Software Reuse," Journal of Systems and Software, vol. 30, pp. 201-212, 1995.
- W. Tracz, "Software Reuse Myths," ACM SIGSOFT Software Engineering Notes, vol. 13, pp. 17-21, 1988.
- H. Reubenstein and R. Waters, "The Requirements Apprentice: Automated assistance for requirements acquisition," IEEE Software, vol. 17, pp. 226-240, 1991.
- N. A. M. Maiden and A. G. Sutcliffe, "Exploiting Reusable Specifications through Analogy," Communications of the ACM, vol. 35, pp. 55-64, 1992.
- P. Massonet and A. van Lamsweerde, "Analogical Reuse of Requirements Frameworks," presented at 3rd International Conference on Requirements Engineering, Washington DC, 1997.
- O. Lopez, M. A. Laguna, and F. J. Garcia, "Reuse-based Analysis and Clustering of Requirements Diagrams," presented at 8th International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'02), Essen, Germany, 2002.
- W. Lam, "Scenario reuse: A technique for complementing scenario-based requirements engineering approaches," presented at 4th Asia Pacific Software Engineering and International Computer Science Conference (APSEC'97 / ICSC'97), Hong Kong, 1997.
- H. G. Woo and W. N. Robinson, "Reuse of Scenario Specifications Using an Automated Relational Learner: A Lightweight Approach," presented at IEEE Joint Conference on Requirements Engineering (RE'02), Essen, Germany, 2002.
- A. Toval, J. Nicolas, B. Moros, and F. Garcia, "Requirements Reuse for Improving Information Systems Security: A Practitioner's Approach," Requirements Engineering Journal, vol. 6, pp. 205-219, 2002.
- CCIMB, "Common Criteria for Information Technology Security Evaluation," Common Criteria Implementation Board, Technical Report CCIMB-99-031, August 1999.
- A. van Lamsweerde and E. Letier, "Handling Obstacles in Goal-Oriented Requirements Engineering," IEEE Transactions on Software Engineering, vol. 26, pp. 978-1005, 2000.
- E. Yu and L. Liu, "Modelling Trust in the i* Strategic Actors Framework," presented at 3rd Workshop on Deception, Fraud and Trust in Agent Societies, Barcelona, 2000.