University of Jos Institutional Repository >
Natural Sciences >
Computer Science >
Please use this identifier to cite or link to this item:
http://hdl.handle.net/123456789/892
|
Title: | Security Requirements Analysis and Validation with Misuse Cases and Institutional Modelling |
Authors: | Bibu, Gideon Dadik Yoshioka, Nobukazu Padget, Julian |
Issue Date: | Feb-2012 |
Publisher: | Center for Global Research in Advanced Software Science and Engineering National Institute of Informatics |
Series/Report no.: | ;Pp1-20 |
Abstract: | The need for early consideration of security during system design and development cannot be overemphasized,
since this allows security features to be properly integrated into the system rather than added
as patches later on. A necessary pre-requisite is the elicitation and analysis of the security requirements
prior to system design. Existing methods for the security requirements phase, such as attack trees and
misuse case analysis, use manual means for analysis, with which it is difficult to validate and analyse system
properties exhaustively. We present a computational solution to this problem using an institutional (also
called normative) specification to capture the requirements in the InstAL action language, which in turn is
implemented in answer set programming (a kind of logic programming language).
The result of solving the answer set program with respect to a set of events is a set of traces that capture
the evolution of the model over time (as defined by the occurrence of events). Verification and validation
is achieved by querying the traces for specific system properties. Using a simple scenario, we show how
any state of the system can be verified with respect to the events that brought about that state. We also
demonstrate how the same traces enable: (i) identification of possible times and causes of security breaches
and (ii) establishment of possible consequences of security violations. |
URI: | http://hdl.handle.net/123456789/892 |
ISSN: | 1884-0760 |
Appears in Collections: | Computer Science
|
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
|