DocumentCode :
1900807
Title :
Using the Common Criteria to Elicit Security Requirements with Use Cases
Author :
Ware, Michael S. ; Bowles, John B. ; Eastman, Caroline M.
Author_Institution :
Fairmont State Univ., WV
fYear :
2005
fDate :
March 31 2005-April 2 2005
Firstpage :
273
Lastpage :
278
Abstract :
The common criteria is often too confusing and technical for non-security specialists to understand and therefore properly use. At the same time, it is essential that security critical IT products under development be validated according to such standards not after but rather during the software engineering process. To help address these issues, this paper presents an approach to eliciting security requirements for IT systems with use cases using common criteria methodologies. The approach involves using actor profiles to derive threats, mapping derived threats to security objectives, and mapping objectives to security requirements using a CC toolbox data set. Our aim is to ensure that security issues are considered early during requirements engineering while making the common criteria more readily available to end-users in an understandable context. Violet, an open source UML diagram modeling tool, has been extended to implement the approach from a use case textual description perspective
Keywords :
Unified Modeling Language; security of data; software development management; CC toolbox data set; Violet; common criteria; open source UML diagram modeling tool; security requirements; software engineering process; Computer aided software engineering; Data security; Information security; Open source software; Programming; Robustness; Software engineering; Software standards; Standards development; Unified modeling language;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
SoutheastCon, 2006. Proceedings of the IEEE
Conference_Location :
Memphis, TN
Print_ISBN :
1-4244-0168-2
Type :
conf
DOI :
10.1109/second.2006.1629363
Filename :
1629363
Link To Document :
بازگشت