2012 Second IEEE International Workshop on Requirements Engineering for Systems, Services, and Systems-of-Systems (RESS) 2012
DOI: 10.1109/res4.2012.6347689
|View full text |Cite
|
Sign up to set email alerts
|

System security requirements analysis with answer set programming

Abstract: The need for early consideration of security during system design and development cannot be over-emphasized, since this allows security features to be properly integrated into the system rather than added as patches later on. A necessary pre-requisite is the elicitation and analysis of the security requirements prior to system design. Existing methods for the security requirements phase, such as attack trees and misuse case analysis, use manual means for analysis, with which it is difficult to validate and ana… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
1
1

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…3. Bibu et al [7] and Pieters et al [31] use normative specifications to explore and to establish security properties. 4.…”
Section: Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…3. Bibu et al [7] and Pieters et al [31] use normative specifications to explore and to establish security properties. 4.…”
Section: Applicationsmentioning
confidence: 99%
“…pyinstql is available from http://www.cs.bath.ac.uk/instal 6 pyviz is available from http://www.cs.bath.ac.uk/instal7 The Bath Sensor Framework provides distributed communications through the use of a XMPP server and is available from https://github.com/mas-at-bath/bsf…”
mentioning
confidence: 99%
“…The query program is an arbitrary AnsProlog program, which is used to validate the model against its requirements by checking properties such as: (i) whether events occur in certain sequences or not and (ii) the presence or absence of state traces (answer sets) that satisfy certain conditions. InstAL has been used in this way for contract analysis [32], [25], security requirements [33], [34] and wireless network management [35].…”
Section: A Model-checkermentioning
confidence: 99%