Application of the Enterprise Model Frame for Security Requirements and Control Identification
نویسندگان
چکیده
It is generally accepted that security requirements have to be identified as early as possible to avoid later rework in the systems development process. However, in practice quite often security aspects are considered either at the later stages of development cycles (increments in agile projects) or addressed only when problems arise. One of the reasons for difficulties of early detection of security requirements is the complexity of security requirements identification. In this paper we discuss an extension of the method for security requirements elicitation from business processes (SREBP). The extension includes the application of the enterprise model frame to provide an enterprise architecture context for analyzed business process models. The enterprise model frame covers practically all concepts of the information security related definitions; the use of the frame with the SREBP method complies with the common enterprise modeling and enterprise architecture approaches; and it use helps to consider security requirements and control at the business, application, and technology levels simultaneously.
منابع مشابه
A model for specification, composition and verification of access control policies and its application to web services
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...
متن کاملApplication of Three Parameter Interval Grey Numbers in Enterprise Resource Planning Selection
This paper applies a new multi attribute decision-making (MADM) model to help companies for enterprise resource planning (ERP) selection problem based on Balanced Score Card method. This paper uses three-parameter interval grey numbers which is derived from Grey theory (was proposed by J. Deng). This numbers is used instead of linguistic variables. Beside, a new weighting method that outcomes f...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملApplication of Three Parameter Interval Grey Numbers in Enterprise Resource Planning Selection
This paper applies a new multi attribute decision-making (MADM) model to help companies for enterprise resource planning (ERP) selection problem based on Balanced Score Card method. This paper uses three-parameter interval grey numbers which is derived from Grey theory (was proposed by J. Deng). This numbers is used instead of linguistic variables. Beside, a new weighting method that outcomes f...
متن کاملAn automatic test case generator for evaluating implementation of access control policies
One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...
متن کامل