Analysis of security failure-Tolerant requirements

Michael Shin, Don Pathirage, Dongsoo Jang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

This paper describes an approach to analyzing security failure-Tolerant (SFT) requirements that are specified by means of SFT use cases, along with security use cases and application use cases for application systems. The SFT requirements are analyzed with the analysis model that consists of the static model and dynamic model. A meta-modeling approach is taken to specify the static and dynamic models for analysis of SFT requirements. Threats are identified in the analysis of SFT requirements, and SFT countermeasures against the threats are specified in the analysis model. An online shopping system is used for illustrating our approach.

Original languageEnglish
Title of host publicationProceedings - SEKE 2018
Subtitle of host publication30th International Conference on Software Engineering and Knowledge Engineering
PublisherKnowledge Systems Institute Graduate School
Pages155-160
Number of pages6
ISBN (Electronic)1891706446
DOIs
StatePublished - 2018
Event30th International Conference on Software Engineering and Knowledge Engineering, SEKE 2018 - Redwood City, United States
Duration: Jul 1 2018Jul 3 2018

Publication series

NameProceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE
Volume2018-July
ISSN (Print)2325-9000
ISSN (Electronic)2325-9086

Conference

Conference30th International Conference on Software Engineering and Knowledge Engineering, SEKE 2018
CountryUnited States
CityRedwood City
Period07/1/1807/3/18

Keywords

  • Analysis of SFT Requirements
  • Dynamic Model
  • Meta-Model
  • Security Failure-Tolerant Requirements
  • Static Model
  • Threat

Fingerprint Dive into the research topics of 'Analysis of security failure-Tolerant requirements'. Together they form a unique fingerprint.

Cite this