Abstract
One key to success for high quality systems developments is to verify not only functional requirements but also the security requirements at the early stage of developments. However, it is difficult for general developers who have only less security knowledge to define verifiable requirements specification without leakages and errors. To reduce these some leakages or errors, this paper proposes a UML-based security requirements verification method using the security knowledge of Common Criteria.
Original language | English |
---|---|
Title of host publication | Proceedings - International Computer Software and Applications Conference |
Pages | 832-833 |
Number of pages | 2 |
DOIs | |
Publication status | Published - 2013 |
Event | 2013 IEEE 27th International Parallel and Distributed Processing Symposium Workshops and PhD Forum, IPDPSW 2013 - Boston, MA, United States Duration: 2013 May 20 → 2013 May 24 |
Other
Other | 2013 IEEE 27th International Parallel and Distributed Processing Symposium Workshops and PhD Forum, IPDPSW 2013 |
---|---|
Country | United States |
City | Boston, MA |
Period | 13/5/20 → 13/5/24 |
Fingerprint
Keywords
- Commmon Criteria
- Model Checking
- Security Requirements
- UML
- Verification
ASJC Scopus subject areas
- Software
- Computer Science Applications
Cite this
UML based security function policy verification method for requirements specification. / Noro, Atsushi; Matsuura, Saeko.
Proceedings - International Computer Software and Applications Conference. 2013. p. 832-833 6649930.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
}
TY - GEN
T1 - UML based security function policy verification method for requirements specification
AU - Noro, Atsushi
AU - Matsuura, Saeko
PY - 2013
Y1 - 2013
N2 - One key to success for high quality systems developments is to verify not only functional requirements but also the security requirements at the early stage of developments. However, it is difficult for general developers who have only less security knowledge to define verifiable requirements specification without leakages and errors. To reduce these some leakages or errors, this paper proposes a UML-based security requirements verification method using the security knowledge of Common Criteria.
AB - One key to success for high quality systems developments is to verify not only functional requirements but also the security requirements at the early stage of developments. However, it is difficult for general developers who have only less security knowledge to define verifiable requirements specification without leakages and errors. To reduce these some leakages or errors, this paper proposes a UML-based security requirements verification method using the security knowledge of Common Criteria.
KW - Commmon Criteria
KW - Model Checking
KW - Security Requirements
KW - UML
KW - Verification
UR - http://www.scopus.com/inward/record.url?scp=84891283365&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84891283365&partnerID=8YFLogxK
U2 - 10.1109/COMPSAC.2013.141
DO - 10.1109/COMPSAC.2013.141
M3 - Conference contribution
AN - SCOPUS:84891283365
SP - 832
EP - 833
BT - Proceedings - International Computer Software and Applications Conference
ER -