Skip to main content

2018 | OriginalPaper | Buchkapitel

3. A Conceptual Model for Usable Secure Requirements Engineering

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter presents a conceptual model for Usable Secure Requirements Engineering. This work builds upon practical work in usability design, and recent research on meta-models for Security Requirements Engineering, to help structure and manage Usability, Security, and Requirements Engineering activities in different contexts. I present an overview of the conceptual model itself, before describing each view of the meta-model: Environment, Asset, Task, Goal, Risk, and Responsibility. For each view, I present and justify the related concepts and their relationships. I illustrate each aspect of the meta-model using examples from a specification exemplar: NeuroGrid.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Feather MS, Fickas S, Finkelstein A, van Lamsweerde A. Requirements and specification exemplars. Autom Softw Eng. 1997;4(4):419–38.CrossRef Feather MS, Fickas S, Finkelstein A, van Lamsweerde A. Requirements and specification exemplars. Autom Softw Eng. 1997;4(4):419–38.CrossRef
2.
Zurück zum Zitat Geddes J, Lloyd S, Simpson A, Rossor M, Fox N, Hill D, et al. NeuroGrid: using grid technology to advance neuroscience. In: Proceedings of 18th IEEE symposium on computer-based medical systems. IEEE Computer Society; 2005. p. 570–2. Geddes J, Lloyd S, Simpson A, Rossor M, Fox N, Hill D, et al. NeuroGrid: using grid technology to advance neuroscience. In: Proceedings of 18th IEEE symposium on computer-based medical systems. IEEE Computer Society; 2005. p. 570–2.
3.
Zurück zum Zitat Ure J, Rakebrandt F, Lloyd S, Khanban AA. Usability, the tri-wizard challenge: recurring scenarios in the design of a healthgrid portal. In: Proceedings of the 2008 conference on human system interactions. IEEE Computer Society; 2008. p. 298–305. Ure J, Rakebrandt F, Lloyd S, Khanban AA. Usability, the tri-wizard challenge: recurring scenarios in the design of a healthgrid portal. In: Proceedings of the 2008 conference on human system interactions. IEEE Computer Society; 2008. p. 298–305.
4.
Zurück zum Zitat International Telecommunication Union. X.509: Information technology - open systems interconnection - the directory: public-key and attribute certificate frameworks. International Telecommunication Union; 2005. International Telecommunication Union. X.509: Information technology - open systems interconnection - the directory: public-key and attribute certificate frameworks. International Telecommunication Union; 2005.
6.
Zurück zum Zitat Faily S, Fléchais I. Designing and Aligning e-science security culture with design. Inf Manag Comput Secur. 2010;18(5):339–49.CrossRef Faily S, Fléchais I. Designing and Aligning e-science security culture with design. Inf Manag Comput Secur. 2010;18(5):339–49.CrossRef
7.
Zurück zum Zitat Dey AK. Understanding and using context. Pers Ubiquitous Comput. 2001;5(1):4–7.CrossRef Dey AK. Understanding and using context. Pers Ubiquitous Comput. 2001;5(1):4–7.CrossRef
8.
Zurück zum Zitat ISO. ISO 9241-11. Ergonomic requirements for office work with visual display terminals (VDT)s - Part 11 Guidance on usability; 1998. ISO. ISO 9241-11. Ergonomic requirements for office work with visual display terminals (VDT)s - Part 11 Guidance on usability; 1998.
9.
Zurück zum Zitat Fléchais I. Designing secure and usable systems. University College London; 2005. Fléchais I. Designing secure and usable systems. University College London; 2005.
10.
Zurück zum Zitat ISO. ISO/IEC 27001: Information technology – security techniques – requirements. ISO/IEC; 2005. ISO. ISO/IEC 27001: Information technology – security techniques – requirements. ISO/IEC; 2005.
11.
Zurück zum Zitat Standard B. BS ISO 7498-2:1989: Information processing systems – open systems – interconnection –basic reference model – Part 2: security architecture; 1989. Standard B. BS ISO 7498-2:1989: Information processing systems – open systems – interconnection –basic reference model – Part 2: security architecture; 1989.
12.
Zurück zum Zitat Nissenbaum H. Accountability in a computerized society. In: Friedman B, editor. Human values and the design of computer technology. Cambridge: Cambridge University Press; 1997. Nissenbaum H. Accountability in a computerized society. In: Friedman B, editor. Human values and the design of computer technology. Cambridge: Cambridge University Press; 1997.
13.
Zurück zum Zitat Noessel C, Cooper A, Reimann R, Cronin D. About face: the essentials of interaction design. 4th ed. New York: Wiley; 2014. Noessel C, Cooper A, Reimann R, Cronin D. About face: the essentials of interaction design. 4th ed. New York: Wiley; 2014.
14.
Zurück zum Zitat Rosson MB, Carroll JM. Scenario-based design. In: Sears A, Jacko JA, editors. The human-computer interaction handbook: fundamentals, evolving technologies, and emerging applications. 2nd ed. Boca Raton: CRC Press; 2008. p. 1041–60. Rosson MB, Carroll JM. Scenario-based design. In: Sears A, Jacko JA, editors. The human-computer interaction handbook: fundamentals, evolving technologies, and emerging applications. 2nd ed. Boca Raton: CRC Press; 2008. p. 1041–60.
15.
Zurück zum Zitat Reason J. The human contribution: unsafe acts. Accidents and heroic recoveries: Ashgate; 2011. Reason J. The human contribution: unsafe acts. Accidents and heroic recoveries: Ashgate; 2011.
16.
Zurück zum Zitat van Lamsweerde A. Requirements Engineering: from system goals to UML models to software specifications. New York: Wiley; 2009. van Lamsweerde A. Requirements Engineering: from system goals to UML models to software specifications. New York: Wiley; 2009.
17.
Zurück zum Zitat Mayer N. Model-based management of information system security risk. University of Namur; 2009. Mayer N. Model-based management of information system security risk. University of Namur; 2009.
18.
Zurück zum Zitat ISO. ISO/IEC 27005: Information technology – security techniques – information security risk management. ISO/IEC; 2008. ISO. ISO/IEC 27005: Information technology – security techniques – information security risk management. ISO/IEC; 2008.
19.
Zurück zum Zitat Rumbaugh J, Jacobson I, Booch G. The unified modeling language reference manual. 2nd ed. Menlo Park: Addison-Wesley; 2005. Rumbaugh J, Jacobson I, Booch G. The unified modeling language reference manual. 2nd ed. Menlo Park: Addison-Wesley; 2005.
Metadaten
Titel
A Conceptual Model for Usable Secure Requirements Engineering
verfasst von
Shamal Faily
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-75493-2_3