谷歌浏览器插件
订阅小程序
在清言上使用

Using the Common Criteria to Elicit Security Requirements with Use Cases

PROCEEDINGS OF THE IEEE SOUTHEASTCON 2006(2006)

引用 23|浏览26
暂无评分
摘要
The common criteria is often too confusing and technical for non-security specialists to understand and therefore properly use. At the same time, it is essential that security critical IT products under development be validated according to such standards not after but rather during the software engineering process. To help address these issues, this paper presents an approach to eliciting security requirements for IT systems with use cases using common criteria methodologies. The approach involves using actor profiles to derive threats, mapping derived threats to security objectives, and mapping objectives to security requirements using a CC toolbox data set. Our aim is to ensure that security issues are considered early during requirements engineering while making the common criteria more readily available to end-users in an understandable context. Violet, an open source UML diagram modeling tool, has been extended to implement the approach from a use case textual description perspective
更多
查看译文
关键词
Unified Modeling Language,security of data,software development management,CC toolbox data set,Violet,common criteria,open source UML diagram modeling tool,security requirements,software engineering process
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要