Reference Hub17
Arguing Satisfaction of Security Requirements

Arguing Satisfaction of Security Requirements

C. B. Haley, R. Laney, J. D. Moffett, B. Nuseibeh
ISBN13: 9781599041476|ISBN10: 1599041472|ISBN13 Softcover: 9781599041483|EISBN13: 9781599041490
DOI: 10.4018/978-1-59904-147-6.ch002
Cite Chapter Cite Chapter

MLA

Haley, C. B., et al. "Arguing Satisfaction of Security Requirements." Integrating Security and Software Engineering: Advances and Future Visions, edited by Haralambos Mouratidis and Paolo Giorgini, IGI Global, 2007, pp. 16-43. https://doi.org/10.4018/978-1-59904-147-6.ch002

APA

Haley, C. B., Laney, R., Moffett, J. D., & Nuseibeh, B. (2007). Arguing Satisfaction of Security Requirements. In H. Mouratidis & P. Giorgini (Eds.), Integrating Security and Software Engineering: Advances and Future Visions (pp. 16-43). IGI Global. https://doi.org/10.4018/978-1-59904-147-6.ch002

Chicago

Haley, C. B., et al. "Arguing Satisfaction of Security Requirements." In Integrating Security and Software Engineering: Advances and Future Visions, edited by Haralambos Mouratidis and Paolo Giorgini, 16-43. Hershey, PA: IGI Global, 2007. https://doi.org/10.4018/978-1-59904-147-6.ch002

Export Reference

Mendeley
Favorite

Abstract

This chapter presents a process for security requirements elicitation and analysis, based around the construction of a satisfaction argument for the security of a system. The process starts with the enumeration of security goals based on assets in the system, then uses these goals to derive security requirements in the form of constraints. Next, a satisfaction argument for the system is constructed, using a problem-centered representation, a formal proof to analyze properties that can be demonstrated, and structured informal argumentation of the assumptions exposed during construction of the argument. Constructing the satisfaction argument can expose missing and inconsistent assumptions about system context and behavior that effect security, and a completed argument provides assurances that a system can respect its security requirements.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.