메뉴 건너뛰기




Volumn 15, Issue 1, 2010, Pages 63-93

Eliciting security requirements and tracing them to design: An integration of Common Criteria, heuristics, and UMLsec

Author keywords

Common Criteria (CC); Heuristics; Secure design; Security requirement elicitation; UMLsec

Indexed keywords

COMMON CRITERIA; DESIGN SECURITY; DESIGN TECHNIQUE; EARLY DETECTION; FEED-BACK LOOP; ITERATIVE PROCESS; SECURE SYSTEM; SECURITY DOMAINS; SECURITY ENGINEERING; SECURITY EXPERTS; SECURITY REQUIREMENTS; SECURITY REQUIREMENTS ENGINEERING; SECURITY STANDARDS; SYSTEM EVOLUTION; UML DESIGN;

EID: 77950516884     PISSN: 09473602     EISSN: 1432010X     Source Type: Journal    
DOI: 10.1007/s00766-009-0093-9     Document Type: Article
Times cited : (103)

References (80)
  • 5
    • 77950516008 scopus 로고    scopus 로고
    • ISO 15408:2007 Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2, CCMB-2007-09-001, CCMB-2007-09-002 and CCMB-2007-09-003, September 2007
    • ISO 15408:2007 Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2, CCMB-2007-09-001, CCMB-2007-09-002 and CCMB-2007-09-003, September 2007
  • 6
    • 77950520686 scopus 로고    scopus 로고
    • ISO 15408:2007 Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2: part 1; General Model, CCMB-2007-09-001, September 2007
    • ISO 15408:2007 Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2: part 1; General Model, CCMB-2007-09-001, September 2007
  • 8
    • 77950516363 scopus 로고    scopus 로고
    • Department of Defense (1985) DoD 5200.28-STD: trusted computer system evaluation criteria. (August 15)
    • Department of Defense (1985) DoD 5200.28-STD: trusted computer system evaluation criteria. (August 15)
  • 9
    • 77950521081 scopus 로고    scopus 로고
    • Government of Canada (1993) The Canadian trusted computer product evaluation criteria (January)
    • Government of Canada (1993) The Canadian trusted computer product evaluation criteria (January)
  • 11
    • 77950518705 scopus 로고    scopus 로고
    • Common Methodology for Information Technology Security Evaluation, Evaluation methodology, Version 3.2, Revision 2, CCMB-2009-09-004, September 2007
    • Common Methodology for Information Technology Security Evaluation, Evaluation methodology, Version 3.2, Revision 2, CCMB-2009-09-004, September 2007
  • 12
    • 77950519586 scopus 로고    scopus 로고
    • ISO 15408:2007 Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2: part 2; security functional components, CCMB-2007-09-002, September 2007
    • ISO 15408:2007 Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2: part 2; security functional components, CCMB-2007-09-002, September 2007
  • 13
    • 77950515903 scopus 로고    scopus 로고
    • ISO 15408:2007 Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2: part 3; security assurance components, CCMB-2007-09-003, September 2007
    • ISO 15408:2007 Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2: part 3; security assurance components, CCMB-2007-09-003, September 2007
  • 14
    • 77950518236 scopus 로고    scopus 로고
    • ISO 15408:2007 (2007) Common Criteria for information technology security evaluation: evaluation methodology, version 3.1, revision 2, CCMB-2007-09-004 (September)
    • ISO 15408:2007 (2007) Common Criteria for information technology security evaluation: evaluation methodology, version 3.1, revision 2, CCMB-2007-09-004 (September)
  • 17
    • 0028448779 scopus 로고
    • Domain-oriented design environments
    • Fischer G (1994) Domain-oriented design environments. Auto-mat Softw Eng 1:177-203
    • (1994) Auto-mat Softw Eng , vol.1 , pp. 177-203
    • Fischer, G.1
  • 19
    • 0032178701 scopus 로고    scopus 로고
    • Seeding, evolutionary growth and reseeding: Constructing, capturing and evolving knowledge in domainoriented design environments
    • Fischer G (1998) Seeding, evolutionary growth and reseeding: constructing, capturing and evolving knowledge in domainoriented design environments. Automat Softw Eng 5:447-464
    • (1998) Automat Softw Eng , vol.5 , pp. 447-464
    • Fischer, G.1
  • 20
    • 77950519990 scopus 로고    scopus 로고
    • Managing requirement engineering processes by adapted quality gateways and critique-based RE-tools
    • Palma de Mallorca, Spain, (November, in conjunction with the IWSM-Mensura Conference)
    • Knauss E, Flohr T (2007) Managing requirement engineering processes by adapted quality gateways and critique-based RE-tools. In: Proceedings of workshop on measuring requirements for project and product success. Palma de Mallorca, Spain (November, in conjunction with the IWSM-Mensura Conference)
    • (2007) Proceedings of Workshop On Measuring Requirements For Project and Product Success
    • Knauss, E.1    Flohr, T.2
  • 25
  • 28
    • 0036037169 scopus 로고    scopus 로고
    • Using UMLsec and goal-trees for secure systems development
    • In: Lamont GB, Haddad H, Papadopoulos G, Panda B, ACM Press
    • Jurjens J (2002) Using UMLsec and goal-trees for secure systems development. In: Lamont GB, Haddad H, Papadopoulos G, Panda B (eds) Proceedings of the 2002 symposium of applied computing (SAC). ACM Press, pp 1026-1031
    • (2002) Proceedings of The 2002 Symposium of Applied Computing (SAC) , pp. 1026-1031
    • Jurjens, J.1
  • 29
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre G, Opdahl AL (2005) Eliciting security requirements with misuse cases. Requir Eng J 10(1):34-44
    • (2005) Requir Eng J , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 33
    • 33746038490 scopus 로고    scopus 로고
    • Towards a comprehensive framework for secure systems development
    • In: Dubois E, Pohl K (eds), Springer, Luxembourg
    • Mouratidis H, Jurjens J, Fox J (2006) Towards a comprehensive framework for secure systems development. In: Dubois E, Pohl K (eds) CAiSE, vol 4001 of lecture notes in computer science. Springer, Luxembourg, pp 48-62
    • (2006) CAiSE, Vol 4001 of Lecture Notes In Computer Science , pp. 48-62
    • Mouratidis, H.1    Jurjens, J.2    Fox, J.3
  • 37
    • 77950519810 scopus 로고    scopus 로고
    • UMLsec tool, 2001-08
    • UMLsec tool, 2001-08. http://www.umlsec.de/url/e-link
  • 38
    • 77950518513 scopus 로고    scopus 로고
    • TISPAN, ETSI (2006) Telecommunications and internet converged services and protocols for advanced networking (TI-SPAN): methods and protocols; part 1: method and proforma for threat, risk, vulnerability analysis. Technical report ETSI TS 102 165-1 V4.2.1, European Telecommunications Standards Institute
    • TISPAN, ETSI (2006) Telecommunications and internet converged services and protocols for advanced networking (TI-SPAN): methods and protocols; part 1: method and proforma for threat, risk, vulnerability analysis. Technical report ETSI TS 102 165-1 V4.2.1, European Telecommunications Standards Institute
  • 42
    • 35148889088 scopus 로고    scopus 로고
    • Improving an industrial reference process by information flow analysis: A case study
    • Riga, Latvia. Springer, Berlin
    • Stapel K, Schneider K, Lubke D, Flohr T (2007) Improving an industrial reference process by information flow analysis: a case study. In: Proceedings of PROFES 2007, vol 4589 of LNCS. Riga, Latvia. Springer, Berlin, pp 147-159
    • (2007) Proceedings of PROFES 2007, Vol 4589 of LNCS , pp. 147-159
    • Stapel, K.1    Schneider, K.2    Lubke, D.3    Flohr, T.4
  • 43
    • 77950517326 scopus 로고    scopus 로고
    • The requirements engineering gap in the OEM-supplier relationship
    • Allmann C, Winkler L, Kolzow T (2006) The requirements engineering gap in the OEM-supplier relationship. J Univers Knowl Manage 1(2):103-111
    • (2006) J Univers Knowl Manage , vol.1 , Issue.2 , pp. 103-111
    • Allmann, C.1    Winkler, L.2    Kolzow, T.3
  • 44
  • 50
    • 40449096076 scopus 로고    scopus 로고
    • Analyzing regulatory rules for privacy and security requirements
    • Breaux TD, Antón AI (2008) Analyzing regulatory rules for privacy and security requirements. IEEE Trans Softw Eng 34(1):5-20
    • (2008) IEEE Trans Softw Eng , vol.34 , Issue.1 , pp. 5-20
    • Breaux, T.D.1    Antón, A.I.2
  • 52
    • 17844409254 scopus 로고    scopus 로고
    • Requirements reuse for improving information systems security: A practitioner's approach
    • Toval A, Nicolás J, Morosa B, García F (2002) Requirements reuse for improving information systems security: a practitioner's approach. Requir Eng J 6:205-219
    • (2002) Requir Eng J , vol.6 , pp. 205-219
    • Toval, A.1    Nicolás, J.2    Morosa, B.3    García, F.4
  • 54
    • 40449096402 scopus 로고    scopus 로고
    • Security requirements engineering: A framework for representation and analysis
    • Haley CB, Laney RC, Moffett JD, Nuseibeh B (2008) Security requirements engineering: a framework for representation and analysis. IEEE Trans Softw Eng 34(1):133-153
    • (2008) IEEE Trans Softw Eng , vol.34 , Issue.1 , pp. 133-153
    • Haley, C.B.1    Laney, R.C.2    Moffett, J.D.3    Nuseibeh, B.4
  • 57
    • 33751416458 scopus 로고    scopus 로고
    • A common criteria based security requirements engineering process for the development of secure information system
    • Mellado D, Medinav, Piattini M (2007) A common criteria based security requirements engineering process for the development of secure information system. Comput Stand Interfaces 29:244-253
    • (2007) Comput Stand Interfaces , vol.29 , pp. 244-253
    • Mellado, D.1    Medinav Piattini, M.2
  • 58
    • 33751189883 scopus 로고    scopus 로고
    • Security quality requirements engineering (square) methodology
    • Mead NR, Steheny T (2005) Security quality requirements engineering (square) methodology. SIGSOFT Softw Eng Notes 30(4):1-7
    • (2005) SIGSOFT Softw Eng Notes , vol.30 , Issue.4 , pp. 1-7
    • Mead, N.R.1    Steheny, T.2
  • 59
    • 77950520078 scopus 로고    scopus 로고
    • ISO/IEC 27001:2005 (2005) Specification for information security management (October)
    • ISO/IEC 27001:2005 (2005) Specification for information security management (October)
  • 60
    • 79959760833 scopus 로고    scopus 로고
    • Security requirements addressing security risks for improving software quality
    • Technical report TUM-I0811, Technische Universitat Munchen, Munich, Germany Requirements Eng (2010)
    • Islam S, Dong W (2008) Security requirements addressing security risks for improving software quality. In: Workshop-band software-Qualitatsmodellierung und-bewertung (SQMB'08), Technical report TUM-I0811, Technische Universitat Munchen, Munich, Germany Requirements Eng (2010) 15:63-93
    • (2008) Workshop-band Software-Qualitatsmodellierung Und-bewertung (SQMB'08) , vol.15 , pp. 63-93
    • Islam, S.1    Dong, W.2
  • 65
    • 38349123642 scopus 로고    scopus 로고
    • A goal oriented approach for modeling and analyzing security trade-offs
    • Springer
    • Elahi G, Yu E (2007) A goal oriented approach for modeling and analyzing security trade-offs. In: ER 2007, vol 4801 of lecture notes in computer science. Springer, pp 375-390
    • (2007) ER 2007, Vol 4801 of Lecture Notes In Computer Science , pp. 375-390
    • Elahi, G.1    Yu, E.2
  • 66
    • 84931024051 scopus 로고    scopus 로고
    • Integrating security and usability into the requirements and design process
    • Flechais I, Mascolo C, Sasse MA (2007) Integrating security and usability into the requirements and design process. Int J Electron Secur Digit Forensics 1(1):12-26
    • (2007) Int J Electron Secur Digit Forensics , vol.1 , Issue.1 , pp. 12-26
    • Flechais, I.1    Mascolo, C.2    Sasse, M.A.3
  • 67
    • 33845216895 scopus 로고    scopus 로고
    • A model based approach to trust, security and assurance
    • Baldwin A, Beres Y, Shiu S, Kearney P (2006) A model based approach to trust, security and assurance. BT Technol J 24(4):53-68
    • (2006) BT Technol J , vol.24 , Issue.4 , pp. 53-68
    • Baldwin, A.1    Beres, Y.2    Shiu, S.3    Kearney, P.4
  • 68
    • 33947420435 scopus 로고    scopus 로고
    • A risk-driven security analysis method and modelling language
    • January
    • Kearney P, Brugger L (2007) A risk-driven security analysis method and modelling language. BT Technol J 25(1) January
    • (2007) BT Technol J , vol.25 , Issue.1
    • Kearney, P.1    Brugger, L.2
  • 69
    • 1942536622 scopus 로고    scopus 로고
    • An aspect-based approach to modeling access control concerns
    • Ray I, France RB, Li Na, Georg G (2004) An aspect-based approach to modeling access control concerns. Inf Softw Technol 46(9):575-587
    • (2004) Inf Softw Technol , vol.46 , Issue.9 , pp. 575-587
    • Ray, I.1    France, R.B.2    Li, N.3    Georg, G.4
  • 71
    • 33745471209 scopus 로고    scopus 로고
    • Model driven security: From UML models to access control infrastructures
    • Basin DA, Doser J, Lodderstedt T (2006) Model driven security: from UML models to access control infrastructures. ACM Trans Softw Eng Methodol 15(1):39-91
    • (2006) ACM Trans Softw Eng Methodol , vol.15 , Issue.1 , pp. 39-91
    • Basin, D.A.1    Doser, J.2    Lodderstedt, T.3
  • 73
    • 73149094681 scopus 로고    scopus 로고
    • Modeling and enforcing advanced access control policies in healthcare systems with SECTET
    • In: Sztipanovits J, Breu R, Ammenwerth E, Bajcsy R, Mitchell JC, Pretschner A (eds), (MOTHIS@Models
    • Alam M, Hafner M, Memon M, Hung P (2007) Modeling and enforcing advanced access control policies in healthcare systems with SECTET. In: Sztipanovits J, Breu R, Ammenwerth E, Bajcsy R, Mitchell JC, Pretschner A (eds) Workshop on model-based trustworthy health information systems (MOTHIS@Models)
    • (2007) Workshop On Model-based Trustworthy Health Information Systems
    • Alam, M.1    Hafner, M.2    Memon, M.3    Hung, P.4
  • 74
    • 55049109759 scopus 로고    scopus 로고
    • Model-driven security engineering for trust management in SECTET
    • Alam M, Hafner M, Breu R (2007) Model-driven security engineering for trust management in SECTET. J Softw 2(1):47-59
    • (2007) J Softw , vol.2 , Issue.1 , pp. 47-59
    • Alam, M.1    Hafner, M.2    Breu, R.3
  • 76
    • 35348959376 scopus 로고    scopus 로고
    • Tools for secure systems development with UML
    • (October 2007. Invited submission to the special issue for, FASE 2004/05)
    • Jurjens J, Shabalin P (2007) Tools for secure systems development with UML. Int J Softw Tools Technol Transf 9(5-6):527-544 (October 2007. Invited submission to the special issue for FASE 2004/05)
    • (2007) Int J Softw Tools Technol Transf , vol.9 , Issue.5-6 , pp. 527-544
    • Jurjens, J.1    Shabalin, P.2
  • 78
    • 55049118116 scopus 로고    scopus 로고
    • Model-based security analysis of the german health card architecture
    • (special section on model-based development of trustworthy health information systems)
    • Jurjens J, Rumm R (2008) Model-based security analysis of the german health card architecture. Methods Inf Med 47(5):409-416 (special section on model-based development of trustworthy health information systems)
    • (2008) Methods Inf Med , vol.47 , Issue.5 , pp. 409-416
    • Jurjens, J.1    Rumm, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.