TY - GEN
T1 - Threat modeling for security failure-tolerant requirements
AU - Shin, Michael
AU - Dorbala, Swetha
AU - Jang, Dongsoo
PY - 2013
Y1 - 2013
N2 - This paper describes an approach to modeling security threats to applications and to deriving security failure-tolerant requirements from the threats. This paper assumes that unbreakable core security services for applications, such as authentication, access control, cryptosystem, or digital signature, are broken all the time in a real-world setting. The UML use case model for application requirements is analyzed to model security threats to the system in terms of threat points at which each threat is described using a structured template. This paper also derives security failure-tolerant requirements from the threats at threat points, and the requirements are modeled by means of security failure-tolerant use cases separately from application use cases in the use case model. A security failure-tolerant use case is extended from an application use case at a security point. The Internet banking application is used to illustrate the proposed approach.
AB - This paper describes an approach to modeling security threats to applications and to deriving security failure-tolerant requirements from the threats. This paper assumes that unbreakable core security services for applications, such as authentication, access control, cryptosystem, or digital signature, are broken all the time in a real-world setting. The UML use case model for application requirements is analyzed to model security threats to the system in terms of threat points at which each threat is described using a structured template. This paper also derives security failure-tolerant requirements from the threats at threat points, and the requirements are modeled by means of security failure-tolerant use cases separately from application use cases in the use case model. A security failure-tolerant use case is extended from an application use case at a security point. The Internet banking application is used to illustrate the proposed approach.
KW - Security failure-tolerant requirements
KW - Security point
KW - Threat modeling
KW - Threat point
KW - Use case model
UR - http://www.scopus.com/inward/record.url?scp=84893590212&partnerID=8YFLogxK
U2 - 10.1109/SocialCom.2013.89
DO - 10.1109/SocialCom.2013.89
M3 - Conference contribution
AN - SCOPUS:84893590212
SN - 9780769551371
T3 - Proceedings - SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013
SP - 594
EP - 599
BT - Proceedings - SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013
T2 - 2013 ASE/IEEE Int. Conf. on Social Computing, SocialCom 2013, the 2013 ASE/IEEE Int. Conf. on Big Data, BigData 2013, the 2013 Int. Conf. on Economic Computing, EconCom 2013, the 2013 PASSAT 2013, and the 2013 ASE/IEEE Int. Conf. on BioMedCom 2013
Y2 - 8 September 2013 through 14 September 2013
ER -