2008
DOI: 10.1504/ijcat.2008.017725
|View full text |Cite
|
Sign up to set email alerts
|

Aspect-oriented specification of threat-driven security requirements

Abstract: This paper presents an aspect-oriented approach to integrated specification of functional and security requirements based on use-case-driven software development. It relies on explicit identification of security threats and threat mitigations. We first identify security threats with respect to use-case-based functional requirements in terms of security goals and the STRIDE category. Then, we suggest threat mitigations for preventing or reducing security threats. To capture the crosscutting nature of threats an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…Security concerns can either be represented graphically or through written documentation. Graphic representations of security threats and attacks range from the use of fault trees [8], attack trees [3], misuse cases [9][10] [11], anti-goals [12] and Petri net [13][14] models. Written documentation of security threats can be represented through the use of vulnerability databases [15], evaluation criteria [16] or security patterns [17].…”
Section: Related Workmentioning
confidence: 99%
“…Security concerns can either be represented graphically or through written documentation. Graphic representations of security threats and attacks range from the use of fault trees [8], attack trees [3], misuse cases [9][10] [11], anti-goals [12] and Petri net [13][14] models. Written documentation of security threats can be represented through the use of vulnerability databases [15], evaluation criteria [16] or security patterns [17].…”
Section: Related Workmentioning
confidence: 99%
“…Alexander discussed a variety of applications of misuse cases beyond security requirements elicitation, such as eliciting general "-ility" requirements, exceptions, and test cases [1]. Built upon the notions of misuse and mitigation use cases, Xu et al [37] have exploited aspect-orientation to capture the crosscutting nature of threats and mitigations so that system requirements are elicited in a more structured way. The structured specification facilitates understanding and analysis of the interplays between functional and security requirements.…”
Section: Related Workmentioning
confidence: 99%
“…The system calculates total amount and displays the order. 9. The customer provides shipping information of the order by inputting address.…”
Section: A Event Flow Information Extractionmentioning
confidence: 99%