Verifying security requirements using model checking technique for UML-based requirements specification

Yoshitaka Aoki, Saeko Matsuura

研究成果: Conference contribution

6 引用 (Scopus)

抄録

Use case analysis is known to be an effective method to clarify functional requirements. Security requirements such as access or information control tend to increase the complexity of functional requirements, and therefore, need to be correctly implemented to minimize risks. However, general developers find it difficult to correctly specify adequate security requirements during the initial phases of the software development process. We propose a method to verify security requirements whose specifications are based on Unified Modeling Language (UML) using the model checking technique and Common Criteria security knowledge. Common Criteria assists in defining adequate security requirements in the form of a table. This helps developers verify whether UML-based requirements analysis models meet those requirements in the early stages of software development. The UML model and the table are transformed into a finite automaton in the UPPAAL model checking tool.

元の言語English
ホスト出版物のタイトル2014 IEEE 1st International Workshop on Requirements Engineering and Testing, RET 2014 - Proceedings
出版者Institute of Electrical and Electronics Engineers Inc.
ページ18-25
ページ数8
ISBN(印刷物)9781479963348
DOI
出版物ステータスPublished - 2014 9 23
イベント2014 IEEE 1st International Workshop on Requirements Engineering and Testing, RET 2014 - Karlskrona
継続期間: 2014 8 262014 8 26

Other

Other2014 IEEE 1st International Workshop on Requirements Engineering and Testing, RET 2014
Karlskrona
期間14/8/2614/8/26

Fingerprint

Unified Modeling Language
Model checking
Specifications
Software engineering
Finite automata
Requirements specification
Unified modeling language

ASJC Scopus subject areas

  • Information Systems and Management
  • Software

これを引用

Aoki, Y., & Matsuura, S. (2014). Verifying security requirements using model checking technique for UML-based requirements specification. : 2014 IEEE 1st International Workshop on Requirements Engineering and Testing, RET 2014 - Proceedings (pp. 18-25). [6908674] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/RET.2014.6908674

Verifying security requirements using model checking technique for UML-based requirements specification. / Aoki, Yoshitaka; Matsuura, Saeko.

2014 IEEE 1st International Workshop on Requirements Engineering and Testing, RET 2014 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2014. p. 18-25 6908674.

研究成果: Conference contribution

Aoki, Y & Matsuura, S 2014, Verifying security requirements using model checking technique for UML-based requirements specification. : 2014 IEEE 1st International Workshop on Requirements Engineering and Testing, RET 2014 - Proceedings., 6908674, Institute of Electrical and Electronics Engineers Inc., pp. 18-25, 2014 IEEE 1st International Workshop on Requirements Engineering and Testing, RET 2014, Karlskrona, 14/8/26. https://doi.org/10.1109/RET.2014.6908674
Aoki Y, Matsuura S. Verifying security requirements using model checking technique for UML-based requirements specification. : 2014 IEEE 1st International Workshop on Requirements Engineering and Testing, RET 2014 - Proceedings. Institute of Electrical and Electronics Engineers Inc. 2014. p. 18-25. 6908674 https://doi.org/10.1109/RET.2014.6908674
Aoki, Yoshitaka ; Matsuura, Saeko. / Verifying security requirements using model checking technique for UML-based requirements specification. 2014 IEEE 1st International Workshop on Requirements Engineering and Testing, RET 2014 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2014. pp. 18-25
@inproceedings{c20fbb67707c4f44902f6292c6caafb4,
title = "Verifying security requirements using model checking technique for UML-based requirements specification",
abstract = "Use case analysis is known to be an effective method to clarify functional requirements. Security requirements such as access or information control tend to increase the complexity of functional requirements, and therefore, need to be correctly implemented to minimize risks. However, general developers find it difficult to correctly specify adequate security requirements during the initial phases of the software development process. We propose a method to verify security requirements whose specifications are based on Unified Modeling Language (UML) using the model checking technique and Common Criteria security knowledge. Common Criteria assists in defining adequate security requirements in the form of a table. This helps developers verify whether UML-based requirements analysis models meet those requirements in the early stages of software development. The UML model and the table are transformed into a finite automaton in the UPPAAL model checking tool.",
keywords = "Access Control, Common Criteria, Model Checking, Security Requirements, UML, Verification",
author = "Yoshitaka Aoki and Saeko Matsuura",
year = "2014",
month = "9",
day = "23",
doi = "10.1109/RET.2014.6908674",
language = "English",
isbn = "9781479963348",
pages = "18--25",
booktitle = "2014 IEEE 1st International Workshop on Requirements Engineering and Testing, RET 2014 - Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Verifying security requirements using model checking technique for UML-based requirements specification

AU - Aoki, Yoshitaka

AU - Matsuura, Saeko

PY - 2014/9/23

Y1 - 2014/9/23

N2 - Use case analysis is known to be an effective method to clarify functional requirements. Security requirements such as access or information control tend to increase the complexity of functional requirements, and therefore, need to be correctly implemented to minimize risks. However, general developers find it difficult to correctly specify adequate security requirements during the initial phases of the software development process. We propose a method to verify security requirements whose specifications are based on Unified Modeling Language (UML) using the model checking technique and Common Criteria security knowledge. Common Criteria assists in defining adequate security requirements in the form of a table. This helps developers verify whether UML-based requirements analysis models meet those requirements in the early stages of software development. The UML model and the table are transformed into a finite automaton in the UPPAAL model checking tool.

AB - Use case analysis is known to be an effective method to clarify functional requirements. Security requirements such as access or information control tend to increase the complexity of functional requirements, and therefore, need to be correctly implemented to minimize risks. However, general developers find it difficult to correctly specify adequate security requirements during the initial phases of the software development process. We propose a method to verify security requirements whose specifications are based on Unified Modeling Language (UML) using the model checking technique and Common Criteria security knowledge. Common Criteria assists in defining adequate security requirements in the form of a table. This helps developers verify whether UML-based requirements analysis models meet those requirements in the early stages of software development. The UML model and the table are transformed into a finite automaton in the UPPAAL model checking tool.

KW - Access Control

KW - Common Criteria

KW - Model Checking

KW - Security Requirements

KW - UML

KW - Verification

UR - http://www.scopus.com/inward/record.url?scp=84908637078&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84908637078&partnerID=8YFLogxK

U2 - 10.1109/RET.2014.6908674

DO - 10.1109/RET.2014.6908674

M3 - Conference contribution

AN - SCOPUS:84908637078

SN - 9781479963348

SP - 18

EP - 25

BT - 2014 IEEE 1st International Workshop on Requirements Engineering and Testing, RET 2014 - Proceedings

PB - Institute of Electrical and Electronics Engineers Inc.

ER -