2008
DOI: 10.1109/tse.2007.70754
|View full text |Cite
|
Sign up to set email alerts
|

Security Requirements Engineering: A Framework for Representation and Analysis

Abstract: Abstract-This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requirements as constraints, and developing satisfaction arguments for the security requirements. The system context is described using a problem-oriented notation, then is validated against the security requirements through construction of a satisfaction argument. The satisfaction argument consists of two parts: a formal argument th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
278
1

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 353 publications
(280 citation statements)
references
References 53 publications
1
278
1
Order By: Relevance
“…In line with existing literature [6,36,37], we define security requirements as constraints on specific functions of a system. Towards this end, security requirements are represented, in Secure Tropos, as Security Constraints.…”
Section: Secure Troposmentioning
confidence: 99%
“…In line with existing literature [6,36,37], we define security requirements as constraints on specific functions of a system. Towards this end, security requirements are represented, in Secure Tropos, as Security Constraints.…”
Section: Secure Troposmentioning
confidence: 99%
“…Security requirements can also be defined as a system specification with required security that includes specifications with the types and levels of protection necessary for the data, information, and application of the system [3].…”
Section: Of Studymentioning
confidence: 99%
“…These instances justify the need for an automation that can help to elicit security requirements and attributes, especially for the novice. To overcome this issue, Haley et al [3] has presented an approach to support security requirements elicitation and analysis. They used a method to construct a system context using a problem-oriented notation.…”
Section: (Figure 2) Security Requirements and Its Related Security Atmentioning
confidence: 99%
“…Haley et al [8], have used Toulmin's argument structure to recursively represent the rebuttals and mitigations when reasoning about the satisfaction of security requirements. In their approach, security requirements are expressed as claims, and are supported by grounds and warrants.…”
Section: Problem Frames and Security Argumentsmentioning
confidence: 99%