首页> 外文期刊>International journal of secure software engineering >Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment
【24h】

Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment

机译:使用资产流和处理器部署来提高信息系统的安全性要求

获取原文
获取原文并翻译 | 示例
           

摘要

The authors cannot comprehensively determine all of the vulnerabilities to an attack only from requirements descriptions. To resolve the problem, the authors propose a method for eliciting security requirements using the information about system architecture. The authors convert a use-case description into a variation of a dataflow diagram called an asset-flow diagram (A FD). The authors then refine the A FDs based on a processor deployment diagram (FDD), which gives information about a system architecture. By using vulnerabilities patterns to an attack, the authors distinguish vulnerabilities to the attack that can be identifiable in A FDs from remaining vulnerabilities to the attack. To prohibit the former vulnerabilities, security requirements are defined as countermeasures and/or modification of existing requirements. To prevent the latter vulnerabilities, security requirements are defined as design and implementation constraints. Through an evaluation of a web application, the authors show that our method enables us to elicit security requirements against several different attacks in different system architectures.
机译:作者不能仅根据需求描述来全面确定攻击的所有漏洞。为了解决该问题,作者提出了一种使用有关系统体系结构的信息来得出安全要求的方法。作者将用例描述转换为称为资产流图(A FD)的数据流图的变体。然后,作者根据处理器部署图(FDD)完善了A FD,该图提供了有关系统体系结构的信息。通过使用攻击的漏洞模式,作者将可以在A FD中识别的攻击漏洞与剩余的攻击漏洞区分开。为了防止以前的漏洞,安全要求定义为对策和/或对现有要求的修改。为了防止后一种漏洞,安全要求被定义为设计和实现约束。通过对Web应用程序的评估,作者表明,我们的方法使我们能够针对不同系统体系结构中的几种不同攻击得出安全性要求。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号