DocumentCode :
2120490
Title :
System security requirements analysis with answer set programming
Author :
Bibu, Gideon ; Yoshioka, Nobukazu ; Padget, Julian
Author_Institution :
Dept. of Comput. Sci., Univ. of Bath, Bath, UK
fYear :
2012
fDate :
25-25 Sept. 2012
Firstpage :
10
Lastpage :
13
Abstract :
The need for early consideration of security during system design and development cannot be over-emphasized, since this allows security features to be properly integrated into the system rather than added as patches later on. A necessary pre-requisite is the elicitation and analysis of the security requirements prior to system design. Existing methods for the security requirements phase, such as attack trees and misuse case analysis, use manual means for analysis, with which it is difficult to validate and analyse system properties exhaustively. We present a computational solution to this problem using an institutional (also called normative) specification to capture the requirements in the InstAL action language, which in turn is implemented in answer set programming (a kind of logic programming language). The result of solving the answer set program with respect to a set of events is a set of traces that capture the evolution of the model over time (as defined by the occurrence of events). Verification is achieved by querying the traces for specific system properties. Using a simple scenario, we show how any state of the system can be verified with respect to the events that brought about that state.We also demonstrate how the same traces enable: (i) identification of possible times and causes of security breaches and (ii) establishment of possible consequences of security violations.
Keywords :
formal verification; logic programming languages; security of data; InstAL action language; answer set programming; attack trees; institutional specification; logic programming language; misuse case analysis; security breaches; security features; security requirements phase; security violations; system security requirements analysis; verification; Analytical models; Cognition; Computational modeling; Educational institutions; Programming; Security; answer set programming; security requirements; verification;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Requirements Engineering for Systems, Services and Systems-of-Systems (RES4), 2012 IEEE Second Workshop on
Conference_Location :
Chicago, IL
Print_ISBN :
978-1-4673-4377-0
Electronic_ISBN :
978-1-4673-4378-7
Type :
conf
DOI :
10.1109/RES4.2012.6347689
Filename :
6347689
Link To Document :
بازگشت