UML based security function policy verification method for requirements specification

Atsushi Noro, Saeko Matsuura

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

One key to success for high quality systems developments is to verify not only functional requirements but also the security requirements at the early stage of developments. However, it is difficult for general developers who have only less security knowledge to define verifiable requirements specification without leakages and errors. To reduce these some leakages or errors, this paper proposes a UML-based security requirements verification method using the security knowledge of Common Criteria.

Original languageEnglish
Title of host publicationProceedings - International Computer Software and Applications Conference
Pages832-833
Number of pages2
DOIs
Publication statusPublished - 2013
Event2013 IEEE 27th International Parallel and Distributed Processing Symposium Workshops and PhD Forum, IPDPSW 2013 - Boston, MA, United States
Duration: 2013 May 202013 May 24

Other

Other2013 IEEE 27th International Parallel and Distributed Processing Symposium Workshops and PhD Forum, IPDPSW 2013
CountryUnited States
CityBoston, MA
Period13/5/2013/5/24

Fingerprint

Specifications

Keywords

  • Commmon Criteria
  • Model Checking
  • Security Requirements
  • UML
  • Verification

ASJC Scopus subject areas

  • Software
  • Computer Science Applications

Cite this

Noro, A., & Matsuura, S. (2013). UML based security function policy verification method for requirements specification. In Proceedings - International Computer Software and Applications Conference (pp. 832-833). [6649930] https://doi.org/10.1109/COMPSAC.2013.141

UML based security function policy verification method for requirements specification. / Noro, Atsushi; Matsuura, Saeko.

Proceedings - International Computer Software and Applications Conference. 2013. p. 832-833 6649930.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Noro, A & Matsuura, S 2013, UML based security function policy verification method for requirements specification. in Proceedings - International Computer Software and Applications Conference., 6649930, pp. 832-833, 2013 IEEE 27th International Parallel and Distributed Processing Symposium Workshops and PhD Forum, IPDPSW 2013, Boston, MA, United States, 13/5/20. https://doi.org/10.1109/COMPSAC.2013.141
Noro A, Matsuura S. UML based security function policy verification method for requirements specification. In Proceedings - International Computer Software and Applications Conference. 2013. p. 832-833. 6649930 https://doi.org/10.1109/COMPSAC.2013.141
Noro, Atsushi ; Matsuura, Saeko. / UML based security function policy verification method for requirements specification. Proceedings - International Computer Software and Applications Conference. 2013. pp. 832-833
@inproceedings{63709918c4594068b4141be6df4e24c5,
title = "UML based security function policy verification method for requirements specification",
abstract = "One key to success for high quality systems developments is to verify not only functional requirements but also the security requirements at the early stage of developments. However, it is difficult for general developers who have only less security knowledge to define verifiable requirements specification without leakages and errors. To reduce these some leakages or errors, this paper proposes a UML-based security requirements verification method using the security knowledge of Common Criteria.",
keywords = "Commmon Criteria, Model Checking, Security Requirements, UML, Verification",
author = "Atsushi Noro and Saeko Matsuura",
year = "2013",
doi = "10.1109/COMPSAC.2013.141",
language = "English",
pages = "832--833",
booktitle = "Proceedings - International Computer Software and Applications Conference",

}

TY - GEN

T1 - UML based security function policy verification method for requirements specification

AU - Noro, Atsushi

AU - Matsuura, Saeko

PY - 2013

Y1 - 2013

N2 - One key to success for high quality systems developments is to verify not only functional requirements but also the security requirements at the early stage of developments. However, it is difficult for general developers who have only less security knowledge to define verifiable requirements specification without leakages and errors. To reduce these some leakages or errors, this paper proposes a UML-based security requirements verification method using the security knowledge of Common Criteria.

AB - One key to success for high quality systems developments is to verify not only functional requirements but also the security requirements at the early stage of developments. However, it is difficult for general developers who have only less security knowledge to define verifiable requirements specification without leakages and errors. To reduce these some leakages or errors, this paper proposes a UML-based security requirements verification method using the security knowledge of Common Criteria.

KW - Commmon Criteria

KW - Model Checking

KW - Security Requirements

KW - UML

KW - Verification

UR - http://www.scopus.com/inward/record.url?scp=84891283365&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84891283365&partnerID=8YFLogxK

U2 - 10.1109/COMPSAC.2013.141

DO - 10.1109/COMPSAC.2013.141

M3 - Conference contribution

SP - 832

EP - 833

BT - Proceedings - International Computer Software and Applications Conference

ER -