Paper published in a journal (Scientific congresses, symposiums and conference proceedings)
Suspicion-driven formal analysis of security requirements
Amalio, Nuno
2009In SECURWARE 2009
Peer reviewed
 

Files


Full Text
SECURWARE09.pdf
Publisher postprint (266.9 kB)
Download

All documents in ORBilu are protected by a user license.

Send to



Details



Keywords :
Security; requirements; formal analysis; Event-Calculus; planning; confidentiality; separation of duty
Abstract :
[en] Increasingly, engineers need to approach security and software engineering in a unified way. This paper presents an approach to the formal analysis of security requirements that is based on planning and uses the concept of suspicion to guide the search for threats and security vulnerabilities in requirements. The approach is tested and illustrated by conducting two experiments: one focussing on a system with a confidentiality security property, and another with an integrity security property enforced through the separation of duty principle. The paper shows that suspicion plays an important role in finding vulnerabilities and security threats in requirements.
Disciplines :
Computer science
Identifiers :
UNILU:UL-CONFERENCE-2009-894
Author, co-author :
Amalio, Nuno ;  University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Language :
English
Title :
Suspicion-driven formal analysis of security requirements
Publication date :
2009
Event name :
SECURWARE 2009
Event place :
Athens, Greece
Event date :
2009
Journal title :
SECURWARE 2009
Publisher :
IEEE
Peer reviewed :
Peer reviewed
Available on ORBilu :
since 09 August 2013

Statistics


Number of views
44 (2 by Unilu)
Number of downloads
188 (0 by Unilu)

Scopus citations®
 
3
Scopus citations®
without self-citations
3
WoS citations
 
0

Bibliography


Similar publications



Contact ORBilu