首页> 外文会议>2013 ASE/IEEE International Conference on Social Computing >Threat Modeling for Security Failure-Tolerant Requirements
【24h】

Threat Modeling for Security Failure-Tolerant Requirements

机译:安全容错要求的威胁建模

获取原文
获取原文并翻译 | 示例

摘要

This paper describes an approach to modeling security threats to applications and to deriving security failure-tolerant requirements from the threats. This paper assumes that unbreakable core security services for applications, such as authentication, access control, cryptosystem, or digital signature, are broken all the time in a real-world setting. The UML use case model for application requirements is analyzed to model security threats to the system in terms of threat points at which each threat is described using a structured template. This paper also derives security failure-tolerant requirements from the threats at threat points, and the requirements are modeled by means of security failure-tolerant use cases separately from application use cases in the use case model. A security failure-tolerant use case is extended from an application use case at a security point. The Internet banking application is used to illustrate the proposed approach.
机译:本文介绍了一种对应用程序的安全威胁进行建模并从威胁中导出安全容错要求的方法。本文假设在现实环境中,始终不间断地破坏用于应用程序的坚不可摧的核心安全服务,例如身份验证,访问控制,密码系统或数字签名。分析用于应用程序需求的UML用例模型,以根据威胁点对系统的安全威胁进行建模,在这些威胁点处,使用结构化模板描述每个威胁。本文还从威胁点的威胁中得出安全容错需求,并通过用例模型中的应用程序用例与安全容错用例分开对需求进行建模。安全容错用例是从安全点上的应用程序用例扩展而来的。网上银行应用程序用于说明所建议的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号