Modelling Security Patterns Using NFR Analysis

Author(s):  
M. Weiss

While many theoretical approaches to security engineering exist, they are often limited to systems of a certain complexity, and require security expertise that is not widely available. Additionally, in the practice of information system development security is but one of many concerns that needs to be addressed, and security concerns are often dealt with in an ad hoc manner. Security patterns promise to ?ll this gap. Patterns enable an ef?cient transfer of experience and skills. However, representing and selecting security patterns remains largely an empirical task. This becomes the more of a challenge as the number of security patterns documented in the literature grows, and as the patterns proposed by different authors often overlap in scope. Our contribution is to use a more explicit representation of the forces addressed by a pattern in the description of security patterns, which is based on non-functional requirements analysis. This representation helps us decide which patterns to ap-ply in a given design context, and anticipate the effect of using several patterns in combination. Speci?cally this chapter describes an approach for selecting security patterns, and exploring the impact of applying these patterns individually, and in concert with other patterns.

2008 ◽  
pp. 1476-1487
Author(s):  
M. Weiss

While many theoretical approaches to security engineering exist, they are often limited to systems of a certain complexity, and require security expertise that is not widely available. Additionally, in the practice of information system development security is but one of many concerns that needs to be addressed, and security concerns are often dealt with in an ad hoc manner. Security patterns promise to ?ll this gap. Patterns enable an ef?cient transfer of experience and skills. However, representing and selecting security patterns remains largely an empirical task. This becomes the more of a challenge as the number of security patterns documented in the literature grows, and as the patterns proposed by different authors often overlap in scope. Our contribution is to use a more explicit representation of the forces addressed by a pattern in the description of security patterns, which is based on non-functional requirements analysis. This representation helps us decide which patterns to ap-ply in a given design context, and anticipate the effect of using several patterns in combination. Speci?cally this chapter describes an approach for selecting security patterns, and exploring the impact of applying these patterns individually, and in concert with other patterns.


2012 ◽  
Vol 30 (6) ◽  
pp. 731-739 ◽  
Author(s):  
Ting-Peng Liang ◽  
Jason Chia-Hsien Wu ◽  
James J. Jiang ◽  
Gary Klein

Author(s):  
Peretz Shoval ◽  
Mark Last ◽  
Avihai Yampolsky

In the analysis phase of the information system development, the user requirements are studied, and analysis models are created. In most UML-based methodologies, the analysis activities include mainly modeling the problem domain using a class diagram, and modeling the user/functional requirements using use cases. Different development methodologies prescribe different orders of carrying out these activities, but there is no commonly agreed order for performing them. In order to find out whether the order of analysis activities makes any difference, and which order leads to better results, a comparative controlled experiment was carried out in a laboratory environment. The subjects were asked to create two analysis models of a given system while working in two opposite orders. The main results of the experiment are that the class diagrams are of better quality when created as the first modeling task, and that analysts prefer starting the analysis by creating class diagrams first.


Author(s):  
Arfan Sansprayada ◽  
Kartika Mariskhana

Abstract—The need for information system development in a company is a basic requirement that must be met by each company in order to run its business processes properly. This is the basic key in a company in order to provide maximum results to find as many profits or profits. Application development or requirements in the application also provide speed for employees to carry out their activities to work properly and optimally. The development of the era requires that companies must be productive and have innovations so that the business wheel of the company can run well. This is based on the development of technology that is so fast that it requires special expertise in its application. This research is expected to be able to help some problems that exist in a company. Where its application can make it easier for employees to carry out their respective duties and roles in order to maximize their potential. For companies, the application of this application can accommodate the company's business wheels so that they can be properly and correctly documented .   Keywords : Systems, Information, Applications


1977 ◽  
Author(s):  
William B. Mitchell ◽  
Robin G. Fegeas ◽  
Katherine A. Fitzpatrick ◽  
Cheryl A. Hallam

Sign in / Sign up

Export Citation Format

Share Document