The Open UniversitySkip to content
 

Deriving security requirements from crosscutting threat descriptions

Haley, Charles B.; Laney, Robin C. and Nuseibeh, Bashar (2004). Deriving security requirements from crosscutting threat descriptions. In: Proceedings of the Third International Conference on Aspect-Oriented Software Development (AOSD'04), 22-26 Mar 2004, Lancaster, UK, ACM Press, pp. 112–121.

Full text available as:
[img]
Preview
PDF (Not Set) - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
Download (201Kb)
URL: http://portal.acm.org/citation.cfm?doid=976270.976...
DOI (Digital Object Identifier) Link: http://dx.doi.org/10.1145/976270.976285
Google Scholar: Look up in Google Scholar

Abstract

It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General security requirements frustrate this goal because it is difficult to determine how they affect the functional requirements of the system.
This paper illustrates how representing threats as crosscutting concerns aids in determining the effect of security requirements on the functional requirements. Assets (objects that have value in a system) are first enumerated, and then threats on these assets are listed. The points where assets and functional requirements join are examined to expose vulnerabilities to the threats. Security requirements, represented as constraints, are added to the functional requirements to reduce the scope of the vulnerabilities. These requirements are used during the analysis and specification process, thereby incorporating security concerns into the functional requirements of the system.

Item Type: Conference Item
ISBN: 1-58113-842-3, 978-1-58113-842-9
Academic Unit/Department: Mathematics, Computing and Technology > Computing & Communications
Interdisciplinary Research Centre: Centre for Research in Computing (CRC)
Item ID: 2491
Depositing User: Charles Haley
Date Deposited: 13 Jun 2006
Last Modified: 06 Dec 2010 13:10
URI: http://oro.open.ac.uk/id/eprint/2491
Share this page:

Actions (login may be required)

View Item
Report issue / request change

Policies | Disclaimer

© The Open University   + 44 (0)870 333 4340   general-enquiries@open.ac.uk