Back to Search Start Over

Goal-Oriented Security Requirements Analysis for a System Used in Several Different Activities

Authors :
Nobuyuki Kanaya
Kenji Kaijiri
Yuji Suzuki
Nobukazu Yoshioka
Takao Okubo
Shinpei Ogata
Haruhiko Kaiya
Source :
Lecture Notes in Business Information Processing ISBN: 9783642384899, CAiSE Workshops
Publication Year :
2013
Publisher :
Springer Berlin Heidelberg, 2013.

Abstract

Because an information system is used in different activities simultaneously today, we have to analyze usages of the system in the existing activities and to-be usages in an intended activity together. Especially, security aspects should be carefully analyzed because existing activities are not always secure. We propose a security requirements analysis method for resolving this problem. To take both existing and intended activities into account together, we integrate them on the basis of the unification of common actors. To explore possible attacks under integrated activities, we enumerate achievable attacks on the basis of the possible means in each actor with the help of security knowledge. To avoid or mitigate the attacks and to achieve fundamental goals, we disable some means or narrow down the means to be monitored with the help of propositional logic formulae. Through case studies on insurance business, we illustrated our idea.

Details

ISBN :
978-3-642-38489-9
ISBNs :
9783642384899
Database :
OpenAIRE
Journal :
Lecture Notes in Business Information Processing ISBN: 9783642384899, CAiSE Workshops
Accession number :
edsair.doi...........d54cc5c6dc2df4b029167127a0914b14
Full Text :
https://doi.org/10.1007/978-3-642-38490-5_43