2004
DOI: 10.1007/978-3-540-30144-8_35
|View full text |Cite
|
Sign up to set email alerts
|

Effective Security Requirements Analysis: HAZOP and Use Cases

Abstract: Abstract. Use cases are widely used for functional requirements elicitation. However, security non-functional requirements are often neglected in this requirements analysis process. As systems become increasingly complex current means of analysis will probably prove ineffective. In the safety domain a variety of effective analysis techniques have emerged over many years. Since the safety and security domains share many similarities, various authors have suggested that safety techniques might usefully find appl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2006
2006
2021
2021

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 40 publications
(24 citation statements)
references
References 9 publications
0
23
0
Order By: Relevance
“…By introducing a special set of guidewords, Winther et al [36] show how HAZOP can be extended to identify security threats. Srivantakul et al [33] combine HAZOP study with UML use case diagrams to identify potential misuse scenarios in computer systems. We take a similar approach to combine PHEA study with HAZOP and analyse user (engineer) behaviour in a SCADA environment.…”
Section: Related Workmentioning
confidence: 99%
“…By introducing a special set of guidewords, Winther et al [36] show how HAZOP can be extended to identify security threats. Srivantakul et al [33] combine HAZOP study with UML use case diagrams to identify potential misuse scenarios in computer systems. We take a similar approach to combine PHEA study with HAZOP and analyse user (engineer) behaviour in a SCADA environment.…”
Section: Related Workmentioning
confidence: 99%
“…Srivatanakul et al [21] criticize Security-HazOp and claim that the recommended guidewords are not flexible enough to bring out the analysts' creativity. They propose to apply guidewords to elements of a case by interpreting the guidewords for the attributes of each element of the case that is subject to deviation.…”
Section: Security-hazopmentioning
confidence: 99%
“…In addition, whenever such proof succeeds, Zenon helps the user to locate the source of the inconsistency (the conflicting security properties) by providing the list of properties (and definitions) not used to complete the proof (since the user can provide more properties than necessary). This approach might be coupled with complementary methods, such as deviational techniques [11], in order to cater for external factors (which can still influence the regulation content) using flaw hypotheses to explore security violations.…”
Section: Consistencymentioning
confidence: 99%