|
|
xiii | |
|
|
xvii | |
Preface |
|
xix | |
|
|
1 | (28) |
|
1 Security Requirements Engineering |
|
|
3 | (8) |
|
1.1 The dawn of security requirements engineering |
|
|
3 | (2) |
|
1.2 The era of socio-technical systems |
|
|
5 | (1) |
|
1.3 Security in socio-technical systems |
|
|
6 | (1) |
|
1.4 On the need of a new approach |
|
|
7 | (1) |
|
1.5 Running example: healthcare |
|
|
8 | (3) |
|
2 An Overview of Computer and Information Security |
|
|
11 | (18) |
|
|
12 | (4) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
2.2 Managing security: threat and risk analysis |
|
|
16 | (6) |
|
2.2.1 Identification of assets and threats |
|
|
17 | (1) |
|
2.2.2 Finding and assessing vulnerabilities |
|
|
18 | (2) |
|
|
20 | (1) |
|
2.2.4 Risk response: countermeasures |
|
|
20 | (2) |
|
|
22 | (5) |
|
|
27 | (1) |
|
|
27 | (2) |
|
|
27 | (2) |
|
II THE STS-ml MODELING LANGUAGE |
|
|
29 | (68) |
|
3 The Socio-Technical Security Modeling Language |
|
|
31 | (42) |
|
3.1 The ten design principles for STS-ml |
|
|
31 | (4) |
|
3.2 Representing actors in socio-technical systems |
|
|
35 | (11) |
|
|
35 | (2) |
|
|
37 | (4) |
|
|
41 | (4) |
|
3.2.4 Structuring information and documents |
|
|
45 | (1) |
|
3.3 Modeling the interactions among actors |
|
|
46 | (5) |
|
|
51 | (1) |
|
3.5 Expressing security requirements in STS-ml |
|
|
52 | (17) |
|
|
53 | (5) |
|
|
58 | (2) |
|
|
60 | (2) |
|
|
62 | (2) |
|
|
64 | (2) |
|
|
66 | (3) |
|
|
69 | (1) |
|
|
70 | (3) |
|
|
70 | (1) |
|
|
71 | (2) |
|
4 Social, Information, and Authorization Views |
|
|
73 | (24) |
|
4.1 Multi-view modeling in STS-ml |
|
|
73 | (1) |
|
|
74 | (13) |
|
4.2.1 Concepts and intentional relationships |
|
|
75 | (6) |
|
4.2.2 Social relationships |
|
|
81 | (1) |
|
|
82 | (1) |
|
4.2.4 Security requirements in the social view |
|
|
82 | (5) |
|
|
87 | (3) |
|
|
90 | (3) |
|
|
93 | (1) |
|
|
94 | (3) |
|
|
94 | (1) |
|
|
94 | (3) |
|
III FROM STS-ml TO THE STS METHOD |
|
|
97 | (34) |
|
5 Automated Analysis of STS-ml Models |
|
|
99 | (20) |
|
5.1 Model well-formedness analysis |
|
|
100 | (3) |
|
|
100 | (1) |
|
5.1.2 Goal single decomposition |
|
|
100 | (1) |
|
5.1.3 Delegation child cycle |
|
|
101 | (1) |
|
5.1.4 Documents part-of cycle |
|
|
101 | (1) |
|
5.1.5 Information part-of cycle |
|
|
101 | (1) |
|
5.1.6 Information without ownership |
|
|
102 | (1) |
|
5.1.7 Authorizations validity |
|
|
102 | (1) |
|
5.1.8 Duplicate authorizations |
|
|
102 | (1) |
|
5.2 Requirements conflict analysis: security analysis |
|
|
103 | (9) |
|
5.2.1 Conflicting authorizations |
|
|
103 | (2) |
|
5.2.2 Conflicts between business policies and security requirements |
|
|
105 | (7) |
|
|
112 | (2) |
|
5.4 Improving a model through analysis |
|
|
114 | (2) |
|
5.4.1 Well-formedness analysis |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
117 | (2) |
|
|
117 | (1) |
|
|
117 | (2) |
|
6 The Socio-Technical Security Method |
|
|
119 | (12) |
|
|
119 | (2) |
|
6.2 STS as part of software/systems engineering methods |
|
|
121 | (1) |
|
|
121 | (3) |
|
6.4 Phase 1: social modeling |
|
|
124 | (1) |
|
6.5 Phase 2: information modeling |
|
|
125 | (1) |
|
6.6 Phase 3: authorization modeling |
|
|
126 | (1) |
|
6.7 Phase 4: automated analysis |
|
|
126 | (1) |
|
6.8 Phase 5: specification |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
128 | (3) |
|
|
128 | (1) |
|
|
128 | (3) |
|
IV STS IN PRACTICE: TOOL AND CASE STUDIES |
|
|
131 | (42) |
|
|
133 | (10) |
|
|
133 | (2) |
|
|
135 | (1) |
|
7.3 Security requirements derivation |
|
|
136 | (3) |
|
7.4 Architectural overview |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
141 | (2) |
|
|
141 | (1) |
|
|
141 | (2) |
|
|
143 | (30) |
|
|
143 | (15) |
|
|
144 | (5) |
|
8.1.2 Information modeling |
|
|
149 | (3) |
|
8.1.3 Authorization modeling |
|
|
152 | (2) |
|
|
154 | (4) |
|
|
158 | (1) |
|
|
158 | (13) |
|
|
160 | (3) |
|
8.2.2 Information modeling |
|
|
163 | (2) |
|
8.2.3 Authorization modeling |
|
|
165 | (2) |
|
|
167 | (3) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
171 | (2) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
173 | (22) |
|
9 Alternative and Complementary Approaches |
|
|
175 | (20) |
|
9.1 Extensions of use cases |
|
|
175 | (3) |
|
|
178 | (1) |
|
|
179 | (2) |
|
|
181 | (1) |
|
|
182 | (2) |
|
|
184 | (1) |
|
|
185 | (3) |
|
|
188 | (1) |
|
|
189 | (2) |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
192 | (2) |
|
|
194 | (1) |
|
|
194 | (1) |
Bibliography |
|
195 | (4) |
Index |
|
199 | |