2005
DOI: 10.1142/s0218194005002580
|View full text |Cite
|
Sign up to set email alerts
|

Understanding and Communicating It Security Specifications With Uml

Abstract: Security specifications of IT products and systems are inherently complex and may subject products to semantic threats due to misunderstanding of key aspects of security objectives by developers, customers and end users. A study is conducted on expressing the security specifications by specially interpreted UML use case diagrams to avoid misunderstanding by peer groups, i.e. to prevent semantic threats at the development phase through improved comprehension of security specifications. We base our results on en… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2006
2006
2006
2006

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…The first aim is to extend the notation to cover the entire Protection Profile or Security Target in addition to the security environment and security objectives. Some results are given in [20]. By systematically transforming the security objectives diagram into a security requirement diagram where SFR specifications can be incorporated and then further into a security function diagram where TOE Summary Specification artifacts can be incorporated, all remaining security specification components can be incorporated into a collection of diagrams.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The first aim is to extend the notation to cover the entire Protection Profile or Security Target in addition to the security environment and security objectives. Some results are given in [20]. By systematically transforming the security objectives diagram into a security requirement diagram where SFR specifications can be incorporated and then further into a security function diagram where TOE Summary Specification artifacts can be incorporated, all remaining security specification components can be incorporated into a collection of diagrams.…”
Section: Discussionmentioning
confidence: 99%
“…Security objective definitions and tracings can be derived from the diagrams but the demonstration of suitability requires knowledge of security functions specified as part of the TOE Summary Specification. Diagrams for expressing security requirements and security functions, and for generating suitability claims among further rationales have been presented in [20].…”
Section: Generation Of St Statementsmentioning
confidence: 99%