Identifying Security Requirement using Reusable State Transition Diagram at Security Threat Location


The KIPS Transactions:PartD, Vol. 13, No. 1, pp. 67-74, Feb. 2006
http://dx.doi.org/10.3745/KIPSTD.2006.13D.1.067,   PDF Download:
Keywords: Security, Security requirement, Analysis
Abstract

The security requirements identification in the software development has received some attention recently. However, previous methods do not provide clear method and process of security requirements identification. We propose a process that software developers can build application specific security requirements from state transition diagrams at the security threat location. The proposed process consists of building model and identifying application specific security requirements. The state transition diagram is constructed through subprocesses i) the identification of security threat locations using security failure data based on the point that attackers exploit software vulnerabilities and attack system assets, ii) the construction of a state transition diagram which is usable to protect, mitigate, and remove vulnerabilities of security threat locations. The identification Process of application specific security requirements consist of i) the analysis of the functional requirements of the software, which are decomposed into a DFD(Data Flow Diagram; the identification of the security threat location; and the appliance of the corresponding state transition diagram into the security threat locations, ii) the construction of the application specific state transition diagram, iii) the construction of security requirements based on the rule of the identification of security requirements. The proposed method is helpful to identify the security requirements easily at an early phase of software development.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
S. Seo, J. You, Y. Kim, B. Kim, "Identifying Security Requirement using Reusable State Transition Diagram at Security Threat Location," The KIPS Transactions:PartD, vol. 13, no. 1, pp. 67-74, 2006. DOI: http://dx.doi.org/10.3745/KIPSTD.2006.13D.1.067.

[ACM Style]
Seongchae Seo, Jinho You, Youngdae Kim, and Byungki Kim. 2006. Identifying Security Requirement using Reusable State Transition Diagram at Security Threat Location. The KIPS Transactions:PartD, 13, 1, (2006), 67-74. DOI: http://dx.doi.org/10.3745/KIPSTD.2006.13D.1.067.