Article (Scientific journals)
Modeling Security and Privacy Requirements: a Use Case-Driven Approach
Mai, Xuan Phu; Göknil, Arda; Shar, Lwin Khin et al.
2018In Information and Software Technology, 100, p. 165-182
Peer reviewed
 

Files


Full Text
Mai-IST-2018.pdf
Publisher postprint (2.06 MB)
Download

All documents in ORBilu are protected by a user license.

Send to



Details



Abstract :
[en] Context: Modern internet-based services, ranging from food-delivery to home-caring, leverage the availability of multiple programmable devices to provide handy services tailored to end-user needs. These services are delivered through an ecosystem of device-specific software components and interfaces (e.g., mobile and wearable device applications). Since they often handle private information (e.g., location and health status), their security and privacy requirements are of crucial importance. Defining and analyzing those requirements is a significant challenge due to the multiple types of software components and devices integrated into software ecosystems. Each software component presents peculiarities that often depend on the context and the devices the component interact with, and that must be considered when dealing with security and privacy requirements. Objective: In this paper, we propose, apply, and assess a modeling method that supports the specification of security and privacy requirements in a structured and analyzable form. Our motivation is that, in many contexts, use cases are common practice for the elicitation of functional requirements and should also be adapted for describing security requirements. Method: We integrate an existing approach for modeling security and privacy requirements in terms of security threats, their mitigations, and their relations to use cases in a misuse case diagram. We introduce new security-related templates, i.e., a mitigation template and a misuse case template for specifying mitigation schemes and misuse case specifications in a structured and analyzable manner. Natural language processing can then be used to automatically report inconsistencies among artifacts and between the templates and specifications. Results: We successfully applied our approach to an industrial healthcare project and report lessons learned and results from structured interviews with engineers. Conclusion: Since our approach supports the precise specification and analysis of security threats, threat scenarios and their mitigations, it also supports decision making and the analysis of compliance to standards.
Research center :
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > SVV - Software Verification and Validation
Disciplines :
Computer science
Author, co-author :
Mai, Xuan Phu ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Göknil, Arda ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Shar, Lwin Khin;  Nanyang Technological University > School of Computer Science and Engineering
Pastore, Fabrizio  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Briand, Lionel ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Shaame, Shaban;  Everdream Soft
External co-authors :
yes
Language :
English
Title :
Modeling Security and Privacy Requirements: a Use Case-Driven Approach
Publication date :
2018
Journal title :
Information and Software Technology
ISSN :
1873-6025
Publisher :
Elsevier Science, Amsterdam, Netherlands
Volume :
100
Pages :
165-182
Peer reviewed :
Peer reviewed
European Projects :
H2020 - 694277 - TUNE - Testing the Untestable: Model Testing of Complex Software-Intensive Systems
FnR Project :
FNR11213850 - Enhanced Daily Living And Health 2 – An Incentive Based Service, 2015 (01/06/2016-30/11/2018) - Lionel Briand
Funders :
FNR - Fonds National de la Recherche [LU]
CER - Conseil Européen de la Recherche [BE]
CE - Commission Européenne [BE]
Available on ORBilu :
since 19 April 2018

Statistics


Number of views
377 (43 by Unilu)
Number of downloads
318 (11 by Unilu)

Scopus citations®
 
44
Scopus citations®
without self-citations
35
OpenCitations
 
36
WoS citations
 
35

Bibliography


Similar publications



Contact ORBilu