首页 | 本学科首页   官方微博 | 高级检索  
     


Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec
Authors:Siv Hilde Houmb  Shareeful Islam  Eric Knauss  Jan Jürjens  Kurt Schneider
Affiliation:1. Connected Objects Laboratory, Service Platform Group, Telenor GBDR, Otto Nielsens vei 12, 7004, Trondheim, Norway
2. Fakult?t für Informatik, Technische Universit?t München, Boltzmannstr. 3, 85748, Garching, Germany
3. Software Engineering Group, Leibniz Universit?t Hannover, Welfengarten 1, 30167, Hannover, Germany
4. Chair for Software Engineering(14), Technische Universit?t Dortmund, Baroper Stra?e 301, 44227, Dortmund, Germany
Abstract:Building secure systems is difficult for many reasons. This paper deals with two of the main challenges: (i) the lack of security expertise in development teams and (ii) the inadequacy of existing methodologies to support developers who are not security experts. The security standard ISO 14508 Common Criteria (CC) together with secure design techniques such as UMLsec can provide the security expertise, knowledge, and guidelines that are needed. However, security expertise and guidelines are not stated explicitly in the CC. They are rather phrased in security domain terminology and difficult to understand for developers. This means that some general security and secure design expertise are required to fully take advantage of the CC and UMLsec. In addition, there is the problem of tracing security requirements and objectives into solution design, which is needed for proof of requirements fulfilment. This paper describes a security requirements engineering methodology called SecReq. SecReq combines three techniques: the CC, the heuristic requirements editor HeRA, and UMLsec. SecReq makes systematic use of the security engineering knowledge contained in the CC and UMLsec, as well as security-related heuristics in the HeRA tool. The integrated SecReq method supports early detection of security-related issues (HeRA), their systematic refinement guided by the CC, and the ability to trace security requirements into UML design models. A feedback loop helps reusing experience within SecReq and turns the approach into an iterative process for the secure system life-cycle, also in the presence of system evolution.
Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号