메뉴 건너뛰기




Volumn , Issue 5, 2008, Pages 75-90

Feature interaction: The security threat from within software systems

Author keywords

Feature interaction detection; Security requirements; Vulnerability analysis

Indexed keywords

FEATURE INTERACTION DETECTION; SECURITY REQUIREMENTS; VULNERABILITY ANALYSIS;

EID: 42449118793     PISSN: 13498614     EISSN: 13498606     Source Type: Journal    
DOI: 10.2201/NiiPi.2008.5.8     Document Type: Article
Times cited : (38)

References (90)
  • 1
    • 42449151043 scopus 로고    scopus 로고
    • R. Accorsi, C. Areces, W. Bouma, and M.d. Rijke, Features as Constraints, in Feature Interactions in Telecommunications and Software Systems, M. Calder and E. Magill, Editors. IOS Press: Amsterdam, pp. 210-225 , 2000.
    • R. Accorsi, C. Areces, W. Bouma, and M.d. Rijke, Features as Constraints, in Feature Interactions in Telecommunications and Software Systems, M. Calder and E. Magill, Editors. IOS Press: Amsterdam, pp. 210-225 , 2000.
  • 2
  • 3
    • 1542727587 scopus 로고
    • A Tool Package Supporting the Use of Colored Nets
    • K. Albert, K. Jensen, and R. Shapiro, "A Tool Package Supporting the Use of Colored Nets." Petri Net Newsletter, vol. 32, pp. 22-35, 1989.
    • (1989) Petri Net Newsletter , vol.32 , pp. 22-35
    • Albert, K.1    Jensen, K.2    Shapiro, R.3
  • 5
    • 7744222444 scopus 로고    scopus 로고
    • Use Case Maps as a Feature Description Notation
    • S. Gilmore and M. Ryan, Editors, Springer, Berlin
    • D. Amyot, "Use Case Maps as a Feature Description Notation," in Language Constructs for Describing Features, S. Gilmore and M. Ryan, Editors. 2001, Springer, Berlin.
    • (2001) Language Constructs for Describing Features
    • Amyot, D.1
  • 6
    • 2942722405 scopus 로고    scopus 로고
    • Special issue: Directions in feature interaction research
    • D. Amyot and L. Logrippo, "Special issue: Directions in feature interaction research." Computer Networks, vol. 45, no. 5, 2004.
    • (2004) Computer Networks , vol.45 , Issue.5
    • Amyot, D.1    Logrippo, L.2
  • 8
    • 17744389340 scopus 로고    scopus 로고
    • A requirements taxonomy for reducing Web site privacy vulnerabilities
    • A.I. Antón, and J.B, Earp, "A requirements taxonomy for reducing Web site privacy vulnerabilities." Journal of Requirements Engineering, vol. 9, no. 3, 2004.
    • (2004) Journal of Requirements Engineering , vol.9 , Issue.3
    • Antón, A.I.1    Earp, J.B.2
  • 11
    • 28844454313 scopus 로고    scopus 로고
    • A soft constraint-based approach to the cascade vulnerability problem
    • S. Bistarelli, "A soft constraint-based approach to the cascade vulnerability problem." Journal of Computer Security, vol. 13, no. 5, pp. 699-720, 2005.
    • (2005) Journal of Computer Security , vol.13 , Issue.5 , pp. 699-720
    • Bistarelli, S.1
  • 14
    • 33846008036 scopus 로고    scopus 로고
    • Propositional Satisfiability and Constraint Programming: A comparative survey
    • L. Bordeaux, Y. Hamadi, and L. Zhang, "Propositional Satisfiability and Constraint Programming: A comparative survey." ACM Computing Surveys, vol. 38, no. 4, p. 12, 2006.
    • (2006) ACM Computing Surveys , vol.38 , Issue.4 , pp. 12
    • Bordeaux, L.1    Hamadi, Y.2    Zhang, L.3
  • 16
    • 35048828410 scopus 로고    scopus 로고
    • J. Bredereke, On Feature Orientation and on Requirements Encapsulation Using Families of Requirements, in Objects, Agents, and Features, J.-J.C.M. Mark D. Ryan, Hans-Dieter Ehrich, Ed. Springer-Verlag, Berlin Heidelberg, pp. 26-44, 2004.
    • J. Bredereke, "On Feature Orientation and on Requirements Encapsulation Using Families of Requirements," in Objects, Agents, and Features, J.-J.C.M. Mark D. Ryan, Hans-Dieter Ehrich, Ed. Springer-Verlag, Berlin Heidelberg, pp. 26-44, 2004.
  • 17
    • 0037437627 scopus 로고    scopus 로고
    • Feature interaction: A critical review and considered forecast
    • M. Calder, M. Kolberg, E. Magill, and S. ReiffMarganiec, "Feature interaction: A critical review and considered forecast." Comput. Networks, vol. 41, no. 1, pp. 115-141, 2003.
    • (2003) Comput. Networks , vol.41 , Issue.1 , pp. 115-141
    • Calder, M.1    Kolberg, M.2    Magill, E.3    ReiffMarganiec, S.4
  • 19
    • 33745460373 scopus 로고    scopus 로고
    • Feature interaction detection by pairwise analysis of LTL properties: A case study
    • M. Calder and A. Miller, "Feature interaction detection by pairwise analysis of LTL properties: a case study." Formal Methods in System Design, vol. 28, no. 3, pp. 213-261, 2006.
    • (2006) Formal Methods in System Design , vol.28 , Issue.3 , pp. 213-261
    • Calder, M.1    Miller, A.2
  • 22
    • 84943675832 scopus 로고
    • Feature interactions in telecommunications systems
    • E.J. Cameron and H. Velthuijsen, "Feature interactions in telecommunications systems." IEEE Communications Magazine, vol. 31, no. 8, pp. 18-23, 1993.
    • (1993) IEEE Communications Magazine , vol.31 , Issue.8 , pp. 18-23
    • Cameron, E.J.1    Velthuijsen, H.2
  • 24
    • 33750711412 scopus 로고    scopus 로고
    • Test generation for interaction detection in feature-rich communication systems
    • C. Chi and R. Hao, "Test generation for interaction detection in feature-rich communication systems." Journal of Computer Networks: Special Issue on Feature Interaction, vol. 51, no. 2, pp. 426-438, 2007.
    • (2007) Journal of Computer Networks: Special Issue on Feature Interaction , vol.51 , Issue.2 , pp. 426-438
    • Chi, C.1    Hao, R.2
  • 25
    • 33947175105 scopus 로고    scopus 로고
    • Generating annotated behavior models from end-user scenarios
    • C. Damas, B. Lambeau, P. Dupont, and A. van Lamsweerde, "Generating annotated behavior models from end-user scenarios." IEEE Trans. Softw. Eng., vol. 31, no. 12, pp. 1056-1073, 2005.
    • (2005) IEEE Trans. Softw. Eng , vol.31 , Issue.12 , pp. 1056-1073
    • Damas, C.1    Lambeau, B.2    Dupont, P.3    van Lamsweerde, A.4
  • 26
    • 2942701913 scopus 로고    scopus 로고
    • Policy-enabled mechanisms for feature interactions: Reality, expectations, challenges
    • P. Dini, A. Clemm, T. Gray, F.J. Lin, L. Logrippo, and S. Reiff-Marganiec, "Policy-enabled mechanisms for feature interactions: reality, expectations, challenges." Comput. Networks, vol. 45, no. 5, pp. 585-603, 2004.
    • (2004) Comput. Networks , vol.45 , Issue.5 , pp. 585-603
    • Dini, P.1    Clemm, A.2    Gray, T.3    Lin, F.J.4    Logrippo, L.5    Reiff-Marganiec, S.6
  • 27
    • 0032118698 scopus 로고    scopus 로고
    • Dynamic constraint satisfaction for feature interaction
    • C.D. Elfe, E.C. Freuder, and D. Lesaint, "Dynamic constraint satisfaction for feature interaction." BT Technology Journal, vol. 16, no 3, 1998.
    • (1998) BT Technology Journal , vol.16 , Issue.3
    • Elfe, C.D.1    Freuder, E.C.2    Lesaint, D.3
  • 29
    • 0033704852 scopus 로고    scopus 로고
    • Feature interaction detection: A LOTOS-based approach
    • Q. Fu, P. Harnois, L. Logrippo, and J. Sincennes, "Feature interaction detection: a LOTOS-based approach." Comput. Networks, vol. 32, no. 4, pp. 433-448, 2000.
    • (2000) Comput. Networks , vol.32 , Issue.4 , pp. 433-448
    • Fu, Q.1    Harnois, P.2    Logrippo, L.3    Sincennes, J.4
  • 30
    • 0027694534 scopus 로고
    • Representing action and change by logic programs
    • M. Gelfond and V. Lifschitz, "Representing action and change by logic programs." The Journal of Logic Programming, vol. 17, no. 2-4, pp. 301-321, 1993.
    • (1993) The Journal of Logic Programming , vol.17 , Issue.2-4 , pp. 301-321
    • Gelfond, M.1    Lifschitz, V.2
  • 32
    • 0342696466 scopus 로고
    • A Formal Framework for Feature Interaction with Emphasis on Testing
    • K.E. Cheng and T. Ohta, Editors. IOS Press. pp
    • J.C. Godskesen, "A Formal Framework for Feature Interaction with Emphasis on Testing," in Feature Interactions in Telecommunications Systems III, K.E. Cheng and T. Ohta, Editors. IOS Press. pp. 21-30, 1995.
    • (1995) Feature Interactions in Telecommunications Systems III , pp. 21-30
    • Godskesen, J.C.1
  • 33
    • 33745130351 scopus 로고    scopus 로고
    • Formal Detection of Feature Interactions with Logic Programming and LOTOS
    • N. Gorse, L. Logrippo, and J. Sincennes, "Formal Detection of Feature Interactions with Logic Programming and LOTOS." Jornal of Software and Systems Modeling, vol. 5, no. 2, p. 135, 2006.
    • (2006) Jornal of Software and Systems Modeling , vol.5 , Issue.2 , pp. 135
    • Gorse, N.1    Logrippo, L.2    Sincennes, J.3
  • 35
    • 0033689084 scopus 로고    scopus 로고
    • Feature combination and interaction detection via foreground/background models
    • R.J. Hall, "Feature combination and interaction detection via foreground/background models." Comput. Networks, vol. 32, no. 4, pp. 449-469, 2000.
    • (2000) Comput. Networks , vol.32 , Issue.4 , pp. 449-469
    • Hall, R.J.1
  • 36
    • 0006786379 scopus 로고    scopus 로고
    • Feature Interaction in Electronic Mail
    • M. Calder and E.H. Magill, Editors. IOS Press, Glasgow, Scotland, UK
    • R.J. Hall, Feature Interaction in Electronic Mail, in Feature Interactions in Telecommunications and Software Systems VI, M. Calder and E.H. Magill, Editors. IOS Press, Glasgow, Scotland, UK, 2000.
    • (2000) Feature Interactions in Telecommunications and Software Systems VI
    • Hall, R.J.1
  • 37
    • 18744405767 scopus 로고    scopus 로고
    • Fundamental Nonmodularity in Electronic Mail
    • 1, pp
    • R.J. Hall, "Fundamental Nonmodularity in Electronic Mail." Autom. Softw. Eng., vol. 12, vol. 1, pp. 41-79, 2005.
    • (2005) Autom. Softw. Eng , vol.12 , pp. 41-79
    • Hall, R.J.1
  • 38
    • 33645337636 scopus 로고    scopus 로고
    • Taxonomy of conflicts in network security policies
    • H. Hamed and E. Al-Shaer, "Taxonomy of conflicts in network security policies." Communications Magazine, IEEE, vol. 44, no. 3, pp. 134-141, 2006.
    • (2006) Communications Magazine, IEEE , vol.44 , Issue.3 , pp. 134-141
    • Hamed, H.1    Al-Shaer, E.2
  • 39
    • 0034450138 scopus 로고    scopus 로고
    • Composing Features and Resolving Interactions
    • J.D. Hay and A.J. M., "Composing Features and Resolving Interactions." ACM SIGSOFT Software Engineering Notes, vol. 25, Issue 6, pp. 110-119, 2000.
    • (2000) ACM SIGSOFT Software Engineering Notes , vol.25 , Issue.6 , pp. 110-119
    • Hay, J.D.1    Atlee, J.M.2
  • 41
    • 0032179535 scopus 로고    scopus 로고
    • Distributed Feature Composition: A Virtual Architecture for Telecommunications Services
    • M. Jackson and P. Zave, "Distributed Feature Composition: A Virtual Architecture for Telecommunications Services." Software Engineering, IEEE Transactions on, vol. 24, no. 10, pp. 831-847, 1998.
    • (1998) Software Engineering, IEEE Transactions on , vol.24 , Issue.10 , pp. 831-847
    • Jackson, M.1    Zave, P.2
  • 43
    • 27644532470 scopus 로고    scopus 로고
    • A scenario-based approach for requirements engineering: Experience in a telecommunication software development project
    • H. Kaindl, "A scenario-based approach for requirements engineering: Experience in a telecommunication software development project." Systems Engineering, vol. 8, no. 3, pp. 197-210, 2005.
    • (2005) Systems Engineering , vol.8 , Issue.3 , pp. 197-210
    • Kaindl, H.1
  • 44
    • 0032181540 scopus 로고    scopus 로고
    • The Feature and Service Interaction Problem in Telecommunications Systems: A Survey
    • D.O. Keck and P.J. Kuehn, "The Feature and Service Interaction Problem in Telecommunications Systems: A Survey." IEEE Trans. on Softw. Eng., vol. 24, no. 10, pp. 779-796, 1998.
    • (1998) IEEE Trans. on Softw. Eng , vol.24 , Issue.10 , pp. 779-796
    • Keck, D.O.1    Kuehn, P.J.2
  • 46
    • 0242695839 scopus 로고    scopus 로고
    • Compatibility Issues between Services Supporting Networked Appliances
    • M. Kolberg, E.H. Magill, and M. Wilson, "Compatibility Issues between Services Supporting Networked Appliances." IEEE Commun. Mag., vol. 41, no. 11, pp. 136-147, 2003.
    • (2003) IEEE Commun. Mag , vol.41 , Issue.11 , pp. 136-147
    • Kolberg, M.1    Magill, E.H.2    Wilson, M.3
  • 50
    • 0030690751 scopus 로고    scopus 로고
    • X. Liu, H. Yang, and H. Zedan, Formal methods for the re-engineering of computing systems: a comparison. in Computer Software and Applications Conference, 1997. COMPSAC '97. Proceedings, The Twenty-First Annual International. 1997
    • X. Liu, H. Yang, and H. Zedan, "Formal methods for the re-engineering of computing systems: a comparison." in Computer Software and Applications Conference, 1997. COMPSAC '97. Proceedings., The Twenty-First Annual International. 1997.
  • 51
    • 2942734003 scopus 로고    scopus 로고
    • Special issue on feature interactions in telecommunications software
    • L. Logrippo, "Special issue on feature interactions in telecommunications software." Comput. Networks and ISDN Systems, vol. 30, no. 15, 1998.
    • (1998) Comput. Networks and ISDN Systems , vol.30 , Issue.15
    • Logrippo, L.1
  • 52
    • 42449106745 scopus 로고    scopus 로고
    • Modelling Feature Interaction Patterns in Nokia Mobila Phones using Coloured Petri Nets
    • Adelaide, Australia, Springer-Verlag Berlin Heidelberg
    • L. Lorentsen, A.-P. Tuovinen, and J. Xu, "Modelling Feature Interaction Patterns in Nokia Mobila Phones using Coloured Petri Nets," in 23th International Conference on Application and Theory of Petri Nets. Adelaide, Australia, Springer-Verlag Berlin Heidelberg, 2002.
    • (2002) 23th International Conference on Application and Theory of Petri Nets
    • Lorentsen, L.1    Tuovinen, A.-P.2    Xu, J.3
  • 54
    • 2942724265 scopus 로고    scopus 로고
    • Feature interactions in embedded control systems
    • A. Metzger, "Feature interactions in embedded control systems." Computer Networks, vol. 45, no. 5, pp. 625-644, 2004.
    • (2004) Computer Networks , vol.45 , Issue.5 , pp. 625-644
    • Metzger, A.1
  • 55
    • 2942734415 scopus 로고    scopus 로고
    • Feature Interaction Detection in Building Control Systems by Means of a Formal Product Model
    • Ottawa, Canada, IO Press
    • A. Metzger and C. Webel, "Feature Interaction Detection in Building Control Systems by Means of a Formal Product Model." in Feature Interactions in Telecommunications and Software Systems VII. Ottawa, Canada, IO Press, 2003.
    • (2003) Feature Interactions in Telecommunications and Software Systems VII
    • Metzger, A.1    Webel, C.2
  • 56
    • 33745864790 scopus 로고    scopus 로고
    • Event calculus and temporal action logics compared
    • E.T. Mueller, "Event calculus and temporal action logics compared." Artificial Intelligence, vol. 170, no. 11, pp. 1017-1029, 2006.
    • (2006) Artificial Intelligence , vol.170 , Issue.11 , pp. 1017-1029
    • Mueller, E.T.1
  • 63
    • 42449102853 scopus 로고    scopus 로고
    • Model-based analysis of configuration vulnerabilities
    • C. Ramakrishnan and R. Sekar, Model-based analysis of configuration vulnerabilities. Intrusion Detection, 2002.
    • (2002) Intrusion Detection
    • Ramakrishnan, C.1    Sekar, R.2
  • 64
    • 33746022977 scopus 로고    scopus 로고
    • Policies: Giving Users Control over Calls
    • M.D. Ryan, J.-J.C. Meyer, and H.-D. Ehrlich, Ed. Springer Verlag, Berlin, pp
    • S. Reiff-Marganiec, "Policies: Giving Users Control over Calls," in Agents, Objects and Features, M.D. Ryan, J.-J.C. Meyer, and H.-D. Ehrlich, Ed. Springer Verlag, Berlin, pp. 189-208, 2004.
    • (2004) Agents, Objects and Features , pp. 189-208
    • Reiff-Marganiec, S.1
  • 68
    • 0345530000 scopus 로고    scopus 로고
    • Requirements Interaction Management
    • W.N. Robinson, S.D. Pawlowski, and V. Volkov, "Requirements Interaction Management." ACM Computi. Surv., vol. 35, no. 2, pp. 132-190, 2003.
    • (2003) ACM Computi. Surv , vol.35 , Issue.2 , pp. 132-190
    • Robinson, W.N.1    Pawlowski, S.D.2    Volkov, V.3
  • 69
    • 1642497296 scopus 로고    scopus 로고
    • The Event Calculus Explained
    • Springer: Berlin, Heidelberg, p
    • M. Shanahan, "The Event Calculus Explained," in Lecture Notes in Computer Science. Springer: Berlin / Heidelberg, p. 409, 1999.
    • (1999) Lecture Notes in Computer Science , pp. 409
    • Shanahan, M.1
  • 71
    • 0033688067 scopus 로고    scopus 로고
    • A hybrid model for specifying features and detecting interactions
    • S. Siddiqi and J.M. Atlee, "A hybrid model for specifying features and detecting interactions." Comput. Networks, vol. 32, no. 4, pp. 471-485, 2000.
    • (2000) Comput. Networks , vol.32 , Issue.4 , pp. 471-485
    • Siddiqi, S.1    Atlee, J.M.2
  • 72
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • vo
    • G. Sindre and A.L. Opdahl, "Eliciting security requirements with misuse cases." Journal of Requirements Engineering, vo, 10, no. 1, pp. 34-44, 2005.
    • (2005) Journal of Requirements Engineering , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 74
    • 34547100991 scopus 로고    scopus 로고
    • An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price
    • R. Telang and S. Wattal, "An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price." Software Engineering, IEEE Transactions on, vol. 33, no. 8, pp. 544-557, 2007.
    • (2007) Software Engineering, IEEE Transactions on , vol.33 , Issue.8 , pp. 544-557
    • Telang, R.1    Wattal, S.2
  • 77
    • 0006785823 scopus 로고    scopus 로고
    • Formalising the Chisel Feature Notation
    • M.H. Calder and E.H. Magill, Ed. IOS Press Amsterdam, Amsterdam, pp
    • K.J. Turner, "Formalising the Chisel Feature Notation," in Proceedings of the Feature Interactions in Telecommunications Networks VI, M.H. Calder and E.H. Magill, Ed. IOS Press Amsterdam, Amsterdam, pp. 241-256, 2000.
    • (2000) Proceedings of the Feature Interactions in Telecommunications Networks VI , pp. 241-256
    • Turner, K.J.1
  • 83
    • 33744959794 scopus 로고    scopus 로고
    • M. Weiss, B. Esfandiari, and Y. Luo, Towards a Classification of Web Service Feature Interactions. in Proceedings Third International Conference ServiceOriented Computing - ICSOC 2005.Amsterdam, The Netherlands: Springer Berlin/Heidelberg. 2005.
    • M. Weiss, B. Esfandiari, and Y. Luo, "Towards a Classification of Web Service Feature Interactions." in Proceedings Third International Conference ServiceOriented Computing - ICSOC 2005.Amsterdam, The Netherlands: Springer Berlin/Heidelberg. 2005.
  • 87
    • 0027685302 scopus 로고
    • Performance analysis of concurrency control using locking with deferred blocking
    • P.S. Yu and D.M. Dias, "Performance analysis of concurrency control using locking with deferred blocking." Software Engineering, IEEE Transactions on, vol. 19, no. 10, pp. 982-996, 1993.
    • (1993) Software Engineering, IEEE Transactions on , vol.19 , Issue.10 , pp. 982-996
    • Yu, P.S.1    Dias, D.M.2
  • 90
    • 0030834984 scopus 로고    scopus 로고
    • Four dark corners of requirements engineering
    • P. Zave and M. Jackson, "Four dark corners of requirements engineering." ACM Trans. Softw. Eng. Methodol. (TOSEM), vol. 6, no. 1, pp. 1-30, 1997.
    • (1997) ACM Trans. Softw. Eng. Methodol. (TOSEM) , vol.6 , Issue.1 , pp. 1-30
    • Zave, P.1    Jackson, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.