Contextualizing Security Goals: A Method for Multilateral Security Requirements Elicitation

نویسندگان

  • Seda F. Gürses
  • Thomas Santen
چکیده

In networked environments, the importance of eliciting security requirements as part of the process of requirements elicitation is increasing. Yet, it is difficult to articulate what security requirements are and how they can be elicited and implemented in the system. Few security requirements elicitation methods deal with the security needs of the end-users in specific contexts towards other end-users of the system – who may or may not be malicious. Often the affects of the users’ social as well as functional roles on their security interests are disregarded. The goal of this paper is to attend to these problems by introducing a method that integrates the process of eliciting security requirements of the end-users into the requirements elicitation process of a multilaterally secure system. Throughout the method emphasis is put on contextualizing security goals by analyzing the different viewpoints: whose security goal is it? against whom? for which functionality? which other users have a mutual interest in or conflict with the given security goal?

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RiskREP: Risk-Based Security Requirements Elicitation and Prioritization

Today, companies are required to be in control of the security of their IT assets. This is especially challenging in the presence of limited budgets and conflicting requirements. Here, we present RiskBased Requirements Elicitation and Prioritization (RiskREP), a method for managing IT security risks by combining the results of a top-down requirements analysis with a bottom-up risk analysis. Top...

متن کامل

Requirement Elicitation Based on Goals with Security and Privacy Policies in Electronic Commerce

This paper describes a method for requirements elicitation based on goals for electronic commerce systems in agreement with security and privacy polices of the site. The method integrates the UWA approach [18] with the GBRAM method [3] for developing requirements policies for secure electronic commerce systems. The resulting method has the objective to guarantee that existing security and priva...

متن کامل

Arguing Satisfaction of Security Requirements

The chapter presents a process for security requirements elicitation and analysis, based around the construction of a satisfaction argument for the security of a system. The process starts with the enumeration of security goals based on assets in the system, then uses these goals to derive security requirements in the form of constraints. Next, a satisfaction argument for the system is construc...

متن کامل

The Open University ’ s repository of research publications and other research outputs Arguing satisfaction of security requirements

The chapter presents a process for security requirements elicitation and analysis, based around the construction of a satisfaction argument for the security of a system. The process starts with the enumeration of security goals based on assets in the system, then uses these goals to derive security requirements in the form of constraints. Next, a satisfaction argument for the system is construc...

متن کامل

’ s repository of research publications and other research outputs Arguing satisfaction of security requirements

The chapter presents a process for security requirements elicitation and analysis, based around the construction of a satisfaction argument for the security of a system. The process starts with the enumeration of security goals based on assets in the system, then uses these goals to derive security requirements in the form of constraints. Next, a satisfaction argument for the system is construc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006