Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions

[Context and motivation] Security engineering is one of the important concerns during system development. It should be addressed throughout the whole system development process. There are several languages for security modelling that help dealing with security risk management at the requirements sta...

Full description

Saved in:
Bibliographic Details
Published inRequirements Engineering: Foundation for Software Quality pp. 132 - 139
Main Authors Chowdhury, Mohammad Jabed Morshed, Matulevičius, Raimundas, Sindre, Guttorm, Karpati, Peter
Format Book Chapter
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin Heidelberg
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:[Context and motivation] Security engineering is one of the important concerns during system development. It should be addressed throughout the whole system development process. There are several languages for security modelling that help dealing with security risk management at the requirements stage. [Question/problem] In this paper, we are focusing on Mal-activity diagrams that are used from requirement engineering to system design stage. More specifically we investigate how this language supports information systems security risks management (ISSRM). [Principal ideas/results] The outcome of this work is an alignment table between the Mal-activity diagrams language constructs to the ISSRM domain model concepts. [Contribution] This result may help developers understand how to model security risks at the system requirement and design stages. Also, it paves the way for interoperability between the modelling languages that are analysed using the same conceptual framework, thus facilitating transformation between these modelling approaches.
ISBN:9783642287138
3642287131
ISSN:0302-9743
1611-3349
DOI:10.1007/978-3-642-28714-5_11