Proceedings of the 10th European Software Engineering Conference Held Jointly With 13th ACM SIGSOFT International Symposium on 2005
DOI: 10.1145/1081706.1081715
|View full text |Cite
|
Sign up to set email alerts
|

Reasoning about confidentiality at requirements engineering time

Abstract: Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive information to never be disclosed to unauthorized agents. Disclosure refers to undesired knowledge states of such agents. In previous work we have extended our requirements specification framework with epistemic constructs for capturing what agents may or may not know about the application. Roughly, an agent knows some property if the la… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2007
2007
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(18 citation statements)
references
References 35 publications
(42 reference statements)
0
17
0
Order By: Relevance
“…De Landtsheer and van Lamsweerde propose modeling which properties agents, authorized or not, can know [22]. The Tropos project, e.g., [29], takes a similar view, but extended to include agents' intentions and explicit trust delegation.…”
Section: Security Requirements From Privacy and Trustmentioning
confidence: 99%
“…De Landtsheer and van Lamsweerde propose modeling which properties agents, authorized or not, can know [22]. The Tropos project, e.g., [29], takes a similar view, but extended to include agents' intentions and explicit trust delegation.…”
Section: Security Requirements From Privacy and Trustmentioning
confidence: 99%
“…De Landtsheer and van Lamsweerde [3] model confidentiality claims as specification patterns, representing properties that unauthorised agents should not know. They identify violations of confidentiality claims in terms of counterexample scenarios present in requirements models.…”
Section: Related Workmentioning
confidence: 99%
“…There may be many threats to security of resources and information e.g. unauthorized access to resources and information, changing the information during the transmission, or disabling the authorized access [2] etc.…”
Section: Introductionmentioning
confidence: 99%