23.02.2015 Views

D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange

D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange

D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

are supported by the argumentation tool OpenArgue [7], developed in the<br />

<strong>SecureChange</strong> project.<br />

In Step 1 (Identify Functional Requirements), functional requirements of the system<br />

and the system context are identified. These requirements may be derived from the<br />

higher-level goals of the system. In Step 2 (Identify Security Goals), assets that need to<br />

be protected, and security goals are identified. In Step 3 (Identify Security<br />

Requirements), security requirements are derived from security goals, and are<br />

expressed as constraints on the functional requirements identified in Step 1.<br />

Figure 7. Overview of the RISA approach<br />

Unlike the fourth step of the Haley et al. framework, only the outer arguments for<br />

security requirements, excluding the inner arguments, are constructed in Step 4<br />

(Construct Outer Arguments) of RISA. These outer arguments are formal, and they<br />

make use of domain properties, correctness of which is examined by inner arguments.<br />

Behavioral premises used in the outer arguments may contain risks, which are<br />

identified as part of risk assessment in RISA.<br />

In Step 5 (Identify Risks), behavioral premises in outer arguments are analyzed in<br />

terms of potential risks that rebut the premises. For instance, in the PED example,<br />

there could be a behavioral premise about the confidentiality of the PIN entered using<br />

the PED keypad. Public security catalogues are then searched to find known security<br />

weaknesses and attack patterns regarding the confidentiality of PIN entered by<br />

consumers using a keypad.<br />

In Step 6 (Classify Risks) the catalogue entries related to risks identified in the previous<br />

step to (i) find appropriate security mechanisms for mitigating them and (ii) classify<br />

<strong>D.3.3</strong> Algorithms for Incremental Requirements Models<br />

Evaluation and Transformation| version 1.19 | page 17/136

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!