SECURITY FUNCTIONAL REQUIREMENTS ANALYSIS FOR DEVELOPING SECURE SOFTWARE by
نویسندگان
چکیده
Dedication To my grandmother, my parents and Jia, thanks for their support and love. iii Acknowledgements This dissertation could not have been finished without many people's support and help. The person I am mostly appreciated for is my advisor: Dr. Barry Boehm. How lucky I am to be his student and work with him for almost 4 years. I cannot achieve today's goal without his consistent guidance, encouragement and support on every aspect of my student life. I also sincerely thank my other committee members: Dr. Neno Medvidovic and Dr. Bert Steece, for the great guidance and feedbacks on my research, presentations and drafts of dissertation. I want to give my special thanks to Ed Colbert, who provides me many useful feedbacks on this research. I felt very happy working with him and learned many things from him. I would also thank for Dr George Freidman and Dr Rick Selby, who gave me many suggestions on how to extend my research and future research areas. I want to thank for my family for the unconditionally love and support. I won't be achieving today's success without his inspiration in my childhood. He is always the greatest person in my life. My mother, even did not spend much time with me, still gave me the best love and care in the world. My lovely younger sister, I will be always loving you and taking care of you. I really want to share all my success with my grandmother. I feel so sad I could not be with her in her last few days. Grandmother and aunt Nan, I wish you could feel all the happiness I feel now, and be very peaceful in the heaven.
منابع مشابه
Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملA CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos
Secure Tropos, an extension of the Tropos methodology, considers security requirements alongside functional requirements, from the early stages of the system development process. The Secure Tropos language uses security concepts such as security constraint, secure goal, secure plan, secure resource, and threat to capture the security concepts from both social and organisational settings. These ...
متن کاملSecurity Requirements Engineering: State of the Art and Practice and Challenges
Security is a property of the system which remains dependable in the face of malice, error, or mischance [3]. In scope of information system, security consists of seven states: confidentiality, integrity, availability, authenticity, accountability, non-repudiation and reliability as defined in ISO/IEC 13335 standard [38]. Introduction of such security goals stem from potential adversaries that ...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملDeveloping a Secure Mobile Grid System through a UML Extension
The idea of developing software through systematic development processes to improve software quality is not new. Nevertheless, there are still many information systems such as those of Grid Computing which are not developed through methodologies that are adapted to their most differentiating features. A systematic development process for Grid systems that supports the participation of mobile no...
متن کاملA Survey on Security Requirements Elicitation and Presentation in Requirements Engineering Phase
Secure software development is the new attention of current world in recent days. Security is the key issue for assuring the quality full software. Since, security is one the non-functional requirement most of the times it is ignored in the requirements phase. But, it is possible to reduce software development cost and time to identify user security requirement in the early stage of the softwar...
متن کامل