DocumentCode :
1846779
Title :
Analysing security requirements patterns based on problems decomposition and composition
Author :
Wen, Yuhong ; Zhao, Haihong ; Liu, Lin
Author_Institution :
Sch. of Software, Tsinghua Univ., Beijing, China
fYear :
2011
fDate :
29-29 Aug. 2011
Firstpage :
11
Lastpage :
20
Abstract :
Security requirements analysis for business information systems in today´s networked organization is difficult due to the complexity of the systems and the frequent change in the environment. Thus, it requires security knowledge to be explicitly represented, and well understood by system analysts and designer, which in turn being applied in feasible problem contexts. System requirements are often represented in modelling frameworks with different analytical focus, so security requirements knowledge shall reflect such difference and form an integrated treatment. This paper proposes to use modelling concepts from the i* and PF modeling language to capture recurring patterns of security problems. The main concepts used are actors, assets, and relations such as ownership and permissions. The major contribution of the approach is proposing the specific problem frames such as ownership, authorization, attack and protection, by decomposing a large problem into sub-problems (base frames), then evaluate the potential threats (attacking frames) applicable to each sub-problem by evaluate the compatibility of the two, security analysis is integrated into the system design process from the outset. The proposal can be generalized to the design of defensive measures as well as other NFR treatments.
Keywords :
computational complexity; information systems; organisational aspects; security of data; simulation languages; systems analysis; NFR treatments; PF modeling language; business information systems; i* modeling language; networked organization; problem composition; problem decomposition; security requirements patterns; system analysts; systems complexity; Analytical models; Authorization; Business; Context; Humans; Information systems; Patterns; Problem Frames; Requirements; Security; i*;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Requirements Patterns (RePa), 2011 First International Workshop on
Conference_Location :
Trento
Print_ISBN :
978-1-4577-1020-9
Electronic_ISBN :
978-1-4577-1022-3
Type :
conf
DOI :
10.1109/RePa.2011.6046726
Filename :
6046726
Link To Document :
بازگشت