基于模型的过程支持安全和隐私需求工程

Shareeful Islam, H. Mouratidis, Christos Kalloniatis, Aleksandar Hudic, L. Zechner
{"title":"基于模型的过程支持安全和隐私需求工程","authors":"Shareeful Islam, H. Mouratidis, Christos Kalloniatis, Aleksandar Hudic, L. Zechner","doi":"10.4018/jsse.2012070101","DOIUrl":null,"url":null,"abstract":"Software systems are becoming more complex, interconnected and liable to adopt continuous change and evolution. It's necessary to develop appropriate methods and techniques to ensure security and privacy of such systems. Research efforts that aim to ensure security and privacy of software systems are distinguished through two main categories: 1 the development of requirements engineering methods, and 2 implementation techniques. Approaches that fall in the first category usually aim to address either security or privacy in an implicit way, with emphasis on the security aspects by developing methods to elicit and analyse security and privacy requirements. Works that fall in the latter categories focus specifically on the later stages of the development process irrespective of the organisational context in which the system will be incorporated. This work introduces a model-based process for security and privacy requirements engineering. In particular, the authors' work includes activities which support to identify and analyse security and privacy requirements for the software system. Their purpose process combines concepts from two well-known requirements engineering methods, Secure Tropos and PriS. A real case study from the EU project E-vote, i.e., an Internet based voting system, is employed to demonstrate the applicability of the approach.","PeriodicalId":89158,"journal":{"name":"International journal of secure software engineering","volume":"78 1","pages":"1-22"},"PeriodicalIF":0.0000,"publicationDate":"2012-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"36","resultStr":"{\"title\":\"Model Based Process to Support Security and Privacy Requirements Engineering\",\"authors\":\"Shareeful Islam, H. Mouratidis, Christos Kalloniatis, Aleksandar Hudic, L. Zechner\",\"doi\":\"10.4018/jsse.2012070101\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Software systems are becoming more complex, interconnected and liable to adopt continuous change and evolution. It's necessary to develop appropriate methods and techniques to ensure security and privacy of such systems. Research efforts that aim to ensure security and privacy of software systems are distinguished through two main categories: 1 the development of requirements engineering methods, and 2 implementation techniques. Approaches that fall in the first category usually aim to address either security or privacy in an implicit way, with emphasis on the security aspects by developing methods to elicit and analyse security and privacy requirements. Works that fall in the latter categories focus specifically on the later stages of the development process irrespective of the organisational context in which the system will be incorporated. This work introduces a model-based process for security and privacy requirements engineering. In particular, the authors' work includes activities which support to identify and analyse security and privacy requirements for the software system. Their purpose process combines concepts from two well-known requirements engineering methods, Secure Tropos and PriS. A real case study from the EU project E-vote, i.e., an Internet based voting system, is employed to demonstrate the applicability of the approach.\",\"PeriodicalId\":89158,\"journal\":{\"name\":\"International journal of secure software engineering\",\"volume\":\"78 1\",\"pages\":\"1-22\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"36\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International journal of secure software engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/jsse.2012070101\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International journal of secure software engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/jsse.2012070101","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 36

摘要

软件系统正变得越来越复杂,相互关联,并且易于采用持续的变化和演变。有必要开发适当的方法和技术来确保此类系统的安全性和隐私性。旨在确保软件系统的安全性和私密性的研究工作主要分为两大类:1 .需求工程方法的开发,2 .实现技术。属于第一类的方法通常旨在以隐含的方式解决安全性或隐私问题,通过开发方法来引出和分析安全性和隐私需求,从而强调安全性方面。属于后一类的作品特别关注开发过程的后期阶段,而不考虑系统将被纳入的组织环境。这项工作为安全和隐私需求工程引入了一个基于模型的过程。特别地,作者的工作包括支持识别和分析软件系统的安全和隐私需求的活动。他们的目的过程结合了两种众所周知的需求工程方法的概念,即Secure Tropos和PriS。本文以欧盟项目E-vote(即基于互联网的投票系统)的实际案例研究为例,论证了该方法的适用性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Model Based Process to Support Security and Privacy Requirements Engineering
Software systems are becoming more complex, interconnected and liable to adopt continuous change and evolution. It's necessary to develop appropriate methods and techniques to ensure security and privacy of such systems. Research efforts that aim to ensure security and privacy of software systems are distinguished through two main categories: 1 the development of requirements engineering methods, and 2 implementation techniques. Approaches that fall in the first category usually aim to address either security or privacy in an implicit way, with emphasis on the security aspects by developing methods to elicit and analyse security and privacy requirements. Works that fall in the latter categories focus specifically on the later stages of the development process irrespective of the organisational context in which the system will be incorporated. This work introduces a model-based process for security and privacy requirements engineering. In particular, the authors' work includes activities which support to identify and analyse security and privacy requirements for the software system. Their purpose process combines concepts from two well-known requirements engineering methods, Secure Tropos and PriS. A real case study from the EU project E-vote, i.e., an Internet based voting system, is employed to demonstrate the applicability of the approach.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信