SECURITY FUNCTIONAL REQUIREMENTS ANALYSIS FOR DEVELOPING SECURE SOFTWARE by

نویسندگان

  • Dan Wu
  • Rick Selby
چکیده

Dedication To my grandmother, my parents and Jia, thanks for their support and love. iii Acknowledgements This dissertation could not have been finished without many people's support and help. The person I am mostly appreciated for is my advisor: Dr. Barry Boehm. How lucky I am to be his student and work with him for almost 4 years. I cannot achieve today's goal without his consistent guidance, encouragement and support on every aspect of my student life. I also sincerely thank my other committee members: Dr. Neno Medvidovic and Dr. Bert Steece, for the great guidance and feedbacks on my research, presentations and drafts of dissertation. I want to give my special thanks to Ed Colbert, who provides me many useful feedbacks on this research. I felt very happy working with him and learned many things from him. I would also thank for Dr George Freidman and Dr Rick Selby, who gave me many suggestions on how to extend my research and future research areas. I want to thank for my family for the unconditionally love and support. I won't be achieving today's success without his inspiration in my childhood. He is always the greatest person in my life. My mother, even did not spend much time with me, still gave me the best love and care in the world. My lovely younger sister, I will be always loving you and taking care of you. I really want to share all my success with my grandmother. I feel so sad I could not be with her in her last few days. Grandmother and aunt Nan, I wish you could feel all the happiness I feel now, and be very peaceful in the heaven.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos

Secure Tropos, an extension of the Tropos methodology, considers security requirements alongside functional requirements, from the early stages of the system development process. The Secure Tropos language uses security concepts such as security constraint, secure goal, secure plan, secure resource, and threat to capture the security concepts from both social and organisational settings. These ...

متن کامل

Security Requirements Engineering: State of the Art and Practice and Challenges

Security is a property of the system which remains dependable in the face of malice, error, or mischance [3]. In scope of information system, security consists of seven states: confidentiality, integrity, availability, authenticity, accountability, non-repudiation and reliability as defined in ISO/IEC 13335 standard [38]. Introduction of such security goals stem from potential adversaries that ...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Developing a Secure Mobile Grid System through a UML Extension

The idea of developing software through systematic development processes to improve software quality is not new. Nevertheless, there are still many information systems such as those of Grid Computing which are not developed through methodologies that are adapted to their most differentiating features. A systematic development process for Grid systems that supports the participation of mobile no...

متن کامل

A Survey on Security Requirements Elicitation and Presentation in Requirements Engineering Phase

Secure software development is the new attention of current world in recent days. Security is the key issue for assuring the quality full software. Since, security is one the non-functional requirement most of the times it is ignored in the requirements phase. But, it is possible to reduce software development cost and time to identify user security requirement in the early stage of the softwar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007