Requirements Engineering for Survivable Systems

نویسنده

  • Nancy R. Mead
چکیده

.............................................................................................................vii 1 Background ..................................................................................................1 1.1 Definition of Requirements Engineering.................................................1 1.2 Typical Requirements Engineering Activities..........................................2 1.3 The Role of Requirements Management ...............................................2 2 Requirements for Survivable Systems .......................................................5 2.1 Survivable Systems Definition ...............................................................5 2.2 Survivability Requirements ....................................................................6 2.2.1 System/Survivability Requirements............................................7 2.2.2 Usage/Intrusion Requirements...................................................9 2.2.3 Development Requirements.......................................................9 2.2.4 Operations Requirements ........................................................10 2.2.5 Evolution Requirements...........................................................10 2.3 Requirements Definition for Essential Services ...................................10 2.4 Requirements Definition for Survivability Services ...............................11 2.4.1 Resistance Service Requirements ...........................................11 2.4.2 Recognition Service Requirements ..........................................12 2.4.3 Recovery Service Requirements..............................................12 2.5 Summary.............................................................................................13 3 Methods and Practices that Support Requirements Engineering for Survivable Systems....................................................................................14 3.1 Some existing methods and practices .................................................14 3.1.1 Misuse and Abuse Cases ........................................................14 3.1.2 Formal Methods.......................................................................16 3.1.3 Use of Trees for Modeling and Analysis...................................17 3.1.4 Software Cost Reduction .........................................................21 3.1.5 Requirements Reuse ...............................................................23 3.1.6 Risk Analysis ...........................................................................23 3.1.7 Examples of Security Requirements ........................................25 3.2 Selection of Promising Methods and Practices for Security and Survivability Requirements Engineering ..............................................25

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Case Study in Requirements for Survivable Systems

Increasing societal dependency on critical infrastructure systems is driving emergence of a new category of requirements engineering that addresses survivability objectives. This paper presents a case study in survivability requirements analysis. Survivability is the capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents. The Surviv...

متن کامل

Life-Cycle Models for Survivable Systems

..................................................................................................................ix 1 Survivability and the System Life Cycle ........................................................1 2 Survivability Concepts ....................................................................................3 2.1 The New Network Paradigm: Organizational Integration ...............

متن کامل

Security Requirements Engineering through Iterative Intrusion-Aware Design

Fundamental to the Survivable Network Analysis (SNA) method, developed at the SEI [2], is the use of intrusion scenarios to improve the survivability of system designs. This position statement describes some relevant insights gained from applying SNA to several significant real-world systems. These insights help understand what is needed to use intrusion scenarios for security requirements engi...

متن کامل

Requirements Definition for Survivable Network Systems

Pervasive societal dependency on large-scale, unbounded network systems, the substantial risks of such dependency, and the growing sophistication of system intruders, have focused increased attention on how to ensure network system survivability. Survivability is the capacity of a system to provide essential services even after successful intrusion and compromise, and to recover full services i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003