|
|
1 | (16) |
|
1.1 System and Security Engineering |
|
|
1 | (1) |
|
1.2 Security and Security Risk Management Standards |
|
|
2 | (2) |
|
1.3 Security Development Approaches |
|
|
4 | (1) |
|
1.4 Domain-Specific Languages for Security Modelling |
|
|
4 | (1) |
|
1.5 Model-Driven Security |
|
|
5 | (1) |
|
1.6 Modelling Perspectives of Secure Software Systems |
|
|
6 | (3) |
|
|
9 | (3) |
|
|
12 | (5) |
|
Part I Security Risk Management |
|
|
|
2 Domain Model for Information Systems Security Risk Management |
|
|
17 | (14) |
|
|
17 | (3) |
|
2.1.1 Asset-Related Concepts |
|
|
17 | (2) |
|
2.1.2 Risk-Related Concepts |
|
|
19 | (1) |
|
2.1.3 Risk Treatment-Related Concepts |
|
|
20 | (1) |
|
2.2 Relationships and Multiplicities |
|
|
20 | (2) |
|
|
22 | (1) |
|
|
22 | (1) |
|
2.5 ISSRM Application Example |
|
|
23 | (4) |
|
|
27 | (2) |
|
|
29 | (2) |
|
|
31 | (12) |
|
|
31 | (2) |
|
|
33 | (1) |
|
3.3 Harm: Malicious Software |
|
|
34 | (2) |
|
3.4 Taxonomy of Security Errors |
|
|
36 | (1) |
|
|
37 | (2) |
|
|
39 | (2) |
|
|
41 | (1) |
|
|
41 | (2) |
|
|
43 | (20) |
|
|
43 | (1) |
|
4.2 Requirements Definition |
|
|
44 | (1) |
|
4.3 Security Requirements Classification |
|
|
45 | (5) |
|
4.4 How to Specify Security Requirements |
|
|
50 | (2) |
|
4.5 Related (to Security) Requirements |
|
|
52 | (4) |
|
|
56 | (2) |
|
|
58 | (5) |
|
Part II Modelling Languages for Security Risk Management |
|
|
|
5 Security Risk-Oriented BPMN |
|
|
63 | (14) |
|
5.1 Business Process Model and Notation |
|
|
63 | (1) |
|
5.2 Security Risk Management Using BPMN |
|
|
64 | (5) |
|
|
65 | (1) |
|
|
65 | (3) |
|
|
68 | (1) |
|
|
69 | (3) |
|
|
72 | (3) |
|
|
75 | (2) |
|
6 Security Risk-Aware Secure Tropos |
|
|
77 | (16) |
|
6.1 Tropos and Secure Tropos |
|
|
77 | (2) |
|
6.2 Security Risk Management Using Secure Tropos |
|
|
79 | (7) |
|
6.2.1 Semantics and Concrete Syntax |
|
|
79 | (2) |
|
|
81 | (5) |
|
|
86 | (3) |
|
|
89 | (2) |
|
|
91 | (2) |
|
7 Security Risk-Oriented Misuse Cases |
|
|
93 | (14) |
|
|
93 | (1) |
|
7.2 Security Risk Management Using Misuse Cases |
|
|
94 | (4) |
|
7.2.1 Semantics and Concrete Syntax |
|
|
94 | (1) |
|
|
95 | (3) |
|
|
98 | (3) |
|
|
101 | (2) |
|
|
103 | (1) |
|
|
104 | (3) |
|
8 Mal-activities for Security Risk Management |
|
|
107 | (12) |
|
8.1 Activity and Mal-activity Diagrams |
|
|
107 | (1) |
|
8.2 Security Risk Management Using Mal-activities |
|
|
108 | (4) |
|
8.2.1 Semantics and Concrete Syntax |
|
|
108 | (2) |
|
|
110 | (2) |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
113 | (6) |
|
Part III Model-Driven Security Development and Application |
|
|
|
9 Transformations Between Security Risk-Oriented Modelling Languages |
|
|
119 | (28) |
|
|
119 | (6) |
|
9.1.1 Transformation Method |
|
|
119 | (1) |
|
9.1.2 Comparison of Modelling Languages |
|
|
120 | (5) |
|
9.2 Transforming from Security Risk-Oriented BPMN to Security Risk-Aware Secure Tropos |
|
|
125 | (4) |
|
9.3 Transforming from Security Risk-Aware Secure Tropos to Security Risk-Oriented Misuse Cases |
|
|
129 | (6) |
|
9.4 Transforming from Security Risk-Oriented Misuse Cases to Mal-activities for Security Risk Management |
|
|
135 | (6) |
|
|
141 | (3) |
|
|
144 | (3) |
|
10 Role-Based Access Control |
|
|
147 | (24) |
|
10.1 Family of RBAC Models |
|
|
147 | (2) |
|
|
149 | (1) |
|
10.3 RBAC Modelling Languages |
|
|
150 | (12) |
|
|
150 | (3) |
|
|
153 | (3) |
|
|
156 | (2) |
|
|
158 | (4) |
|
10.4 Model-Driven Security |
|
|
162 | (3) |
|
|
165 | (2) |
|
|
167 | (4) |
|
11 Secure System Development Using Patterns |
|
|
171 | (28) |
|
|
171 | (1) |
|
11.2 Security Pattern Taxonomy |
|
|
172 | (2) |
|
11.3 Security Risk-Oriented Patterns |
|
|
174 | (6) |
|
11.4 Security Requirements Elicitation from Business Processes |
|
|
180 | (13) |
|
|
182 | (3) |
|
11.4.2 Pattern Application |
|
|
185 | (8) |
|
|
193 | (1) |
|
|
194 | (5) |
|
Part IV Concluding Remarks |
|
|
|
12 Secure System Development |
|
|
199 | (10) |
|
12.1 Secure System Development Processes |
|
|
199 | (5) |
|
12.1.1 Microsoft Secure System Development Lifecycle |
|
|
200 | (1) |
|
|
201 | (1) |
|
|
202 | (2) |
|
|
204 | (1) |
|
12.2 Security Approaches in Secure Systems Development Processes |
|
|
204 | (2) |
|
|
206 | (1) |
|
|
207 | (2) |
References |
|
209 | |