:::

詳目顯示

回上一頁
題名:軟體安全需求品質改善程序提升系統安全性之研究
書刊名:電腦稽核
作者:賴森堂 引用關係
出版日期:2014
卷期:30
頁次:頁41-53
主題關鍵詞:安全需求品質特性量測模式Misuse casesSRIQIPSecurity requirementQuality characteristicImprovement procedure
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:2
早期的軟體工程技術著重於生產力與品質的提升,使用單位對系統需求則以功能為重心,完全忽略系統安全的重要性,ISO軟體品質架構中,安全性被視為低層級的次要特性,這完全不能符合資訊網路年代的系統。以use cases描述的功能需求,儼然已成為分析系統需求的一套標準,不過,對於非功能性的需求,目前並沒有一套統一且完善的分析與描繪方法,特別是安全需求,造成安全需求不易融入系統。本文針對misuse cases安全需求項目(Security Requirement Items; SRI)分析、表達方式與確認活動等進行討論,為了確保安全需求能夠具體落實系統中,SRI應具備溝通、確認及變動等特質,結合品質量測模式,本文提出一套SRI品質改善程序(SRI Quality Improvement Procedure; SRIQIP),協助適時標示SRI的品質缺失,且配合矯正作業持續改善SRI品質,以有效提升系統安全性。
In early phase, software engineering technology emphasized software productivity and quality improvement. System user just was concerned about functional requirement and almost omitted the importance of system security. In ISO software quality architecture, security is regarded a sub-characteristic and belonged the functionality. It completely does not meet the e-commerce and internet age. Use cases almost is a standard for describing system functional requirement. However, security does not belong to functional requirement. Security requirement should use a suitable manner for describing and analyzing. In this paper, misuse cases security requirement items (SRI) analysis and specification are discussed. Major missions of SRI, quality characteristics of SRI and SRI quality factors collection are studied. Based on SRI quality measurement model, the paper proposes the SRI Quality Improvement Procedure (SRIQIP). Applying SRIQIP, quality defects of security requirement can be identified. With quality improvement operation, security requirement quality can be enhanced continuously and system security can be increased.
期刊論文
1.Apvrille, A.、Pourzandi, M.(2005)。Secure Software Development by Example。IEEE Security & Privacy,3(4),10-17。  new window
2.Firesmith, D. G.(2003)。Security Use Cases。Journal of Object Technology,2(3),53-64。  new window
3.Hall, A.、Chapman, Roderick(2002)。Correctness by Construction: Developing a Commercial Secure System。IEEE Software,19(1),18-25。  new window
4.Peterson, G.、Steven, J.(2006)。Defining Misuse within the Development Process。IEEE Security and Privacy,2(2),80-83。  new window
5.Sindre, G.、Opdahl, A. L.(2005)。Eliciting Security Requirements with Misuse Cases。Requirements Eng,10(1),34-44。  new window
會議論文
1.賴森堂(2012)。以限制性安全規格提升軟體安全品質之研究。2012台灣軟體工程研討會。台北科技大學。  延伸查詢new window
2.McDermott, J.、Fox, C.(1999)。Using Abuse Case Models for Security Requirements Analysis。The 15th Annual Computer Security Applications Conference。IEEE CS Press。55-64。  new window
3.Matulevicius, R.、Mayer, N.、Heymans, P.(2008)。Alignment of Misuse Cases with Security Risk Management。The Third International Conference on Availability, Reliability and Security。  new window
4.Sindre, G.、Opdahl, A. L.(2001)。Templates for Misuse Case Description。The 7TH International Workshop on Requirements Engineering, Foundation for Software Quality。  new window
圖書
1.Conte, S. D.、Dunsmore, H. E.、Shen, V. Y.(1986)。Software Engineering Metrics and Models。Menlo Park。  new window
2.Fenton, N. E.(1991)。Software Metrics: A Rigorous Approach。Chapman & Hall。  new window
3.Boehm, B. W.(1981)。Software Engineering Economics。Englewood Cliffs, NJ:Prentice-Hall。  new window
4.Schach, S. R.(2010)。Object-Oriented Software Engineering。McGraw-Hill Companies。  new window
5.Viega, J.、McGraw, G.(2004)。Building Secure Software。Addison-Wesley。  new window
6.Tudor, J.(2013)。Web Application Vulnerability Statistics 2013。Context Information Security。  new window
7.McGraw, G.(2006)。Software Security-Building Security In。Addison-Wesley。  new window
8.Pressman, R. S.(2010)。Software Engineering: A Practitioner's Approach。New York, NY:McGraw-Hill。  new window
其他
1.SANS Top 20(2010)。The Top Cyber Security Risks,http://www.sans.org/top-cyber-security-risks/, 2010/07/24。  new window
2.(2013)。OWASP Top 10,http://www.owasp.org.tw/blog/。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關博士論文
 
無相關書籍
 
無相關著作
 
無相關點閱
 
QR Code
QRCODE