Verifying security requirements using model checking technique for UML-based requirements specification

Yoshitaka Aoki, Saeko Matsuura

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

Use case analysis is known to be an effective method to clarify functional requirements. Security requirements such as access or information control tend to increase the complexity of functional requirements, and therefore, need to be correctly implemented to minimize risks. However, general developers find it difficult to correctly specify adequate security requirements during the initial phases of the software development process. We propose a method to verify security requirements whose specifications are based on Unified Modeling Language (UML) using the model checking technique and Common Criteria security knowledge. Common Criteria assists in defining adequate security requirements in the form of a table. This helps developers verify whether UML-based requirements analysis models meet those requirements in the early stages of software development. The UML model and the table are transformed into a finite automaton in the UPPAAL model checking tool.

Original languageEnglish
Title of host publication2014 IEEE 1st International Workshop on Requirements Engineering and Testing, RET 2014 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages18-25
Number of pages8
ISBN (Electronic)9781479963348
DOIs
Publication statusPublished - 2014 Sep 23
Event2014 IEEE 1st International Workshop on Requirements Engineering and Testing, RET 2014 - Karlskrona, Sweden
Duration: 2014 Aug 262014 Aug 26

Publication series

Name2014 IEEE 1st International Workshop on Requirements Engineering and Testing, RET 2014 - Proceedings

Conference

Conference2014 IEEE 1st International Workshop on Requirements Engineering and Testing, RET 2014
CountrySweden
CityKarlskrona
Period14/8/2614/8/26

Keywords

  • Access Control
  • Common Criteria
  • Model Checking
  • Security Requirements
  • UML
  • Verification

ASJC Scopus subject areas

  • Information Systems and Management
  • Software

Fingerprint Dive into the research topics of 'Verifying security requirements using model checking technique for UML-based requirements specification'. Together they form a unique fingerprint.

  • Cite this

    Aoki, Y., & Matsuura, S. (2014). Verifying security requirements using model checking technique for UML-based requirements specification. In 2014 IEEE 1st International Workshop on Requirements Engineering and Testing, RET 2014 - Proceedings (pp. 18-25). [6908674] (2014 IEEE 1st International Workshop on Requirements Engineering and Testing, RET 2014 - Proceedings). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/RET.2014.6908674