Title :
Goal-Oriented, B-Based Formal Derivation of Security Design Specifications from Security Requirements
Author :
Hassan, Riham ; Bohner, Shawn ; El-Kassas, Sherif ; Eltoweissy, Mohamed
Author_Institution :
Dept. of Comput. Sci., Virginia Tech, Blacksburg, VI
Abstract :
This paper proposes a requirements-driven security engineering approach for modeling, specifying, and analyzing application-specific security requirements that are formally derived into security design specifications preserving security requirements properties. The approach adopts and non-trivially extends the goal-oriented KAOS (Knowledge Acquisition in automated Specifications) framework developed by Lamsweerde to formally construct a complete, consistent, and clear security requirements model. The resulting model is then extended using the B method to produce security design specifications and further implementation while preserving requirements properties. In our approach, we firstly transform the KAOS requirements model to an abstract B model and secondly, we refine the model using B refinement mechanism to generate design specifications and implementation. This unique treatment of secure software engineering is systematic, constructive and considers security early in the development lifecycle while ensuring no loss of the security requirements properties of completeness, consistency and clarity at later development phases. Moreover, our approach allows for requirement traceability at the various phases of development.
Keywords :
formal specification; knowledge acquisition; security of data; B refinement mechanism; B-based formal derivation; goal-oriented KAOS framework; knowledge acquisition-automated specification; requirements-driven security engineering approach; secure software engineering; security design specification; Availability; Computer science; Computer security; Costs; Design engineering; Internet; Knowledge acquisition; Open source software; Software design; Software engineering; Goal-oriented security requirements engineering; attack analysis; design specifications; formal methods; threat models;
Conference_Titel :
Availability, Reliability and Security, 2008. ARES 08. Third International Conference on
Conference_Location :
Barcelona
Print_ISBN :
978-0-7695-3102-1
DOI :
10.1109/ARES.2008.77