عرض بسيط للتسجيلة

المؤلفNhlabatsi, Armstrong
المؤلفYu, Yijun
المؤلفZisman,
المؤلفrea
المؤلفTun, Thein
المؤلفKhan, Niamul
المؤلفBandara, Arosha
المؤلفKhan, Khaled M.
المؤلفNuseibeh, Bashar
تاريخ الإتاحة2024-04-02T06:04:49Z
تاريخ النشر2015
اسم المنشورProceedings - 2015 IEEE/ACM 8th International Symposium on Software and Systems Traceability, SST 2015
المصدرScopus
معرّف المصادر الموحدhttp://dx.doi.org/10.1109/SST.2015.14
معرّف المصادر الموحدhttp://hdl.handle.net/10576/53790
الملخصSecurity control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions about the operational environment often reveal unexpected flaws. To diagnose the causes of violations in security requirements it is necessary to check these design-time assumptions. Otherwise, the system could be vulnerable to potential attacks. Addressing such vulnerabilities requires an explicit understanding of how the security control specifications were defined from the original security requirements. However, assumptions are rarely explicitly documented and monitored during system operation. This paper proposes a systematic approach to monitoring design-time assumptions explicitly as logs, by using trace ability links from requirements to specifications. The work also helps identify which alternative specifications of security control can be used to satisfy a security requirement that has been violated based on the logs. The work is illustrated by an example of an electronic patient record system.
اللغةen
الناشرInstitute of Electrical and Electronics Engineers Inc.
الموضوعAssumptions
Causal Traceability
Security
العنوانManaging Security Control Assumptions Using Causal Traceability
النوعConference Paper
الصفحات43-49
dc.accessType Abstract Only


الملفات في هذه التسجيلة

الملفاتالحجمالصيغةالعرض

لا توجد ملفات لها صلة بهذه التسجيلة.

هذه التسجيلة تظهر في المجموعات التالية

عرض بسيط للتسجيلة