skip to main content
10.1145/2721956.2721963acmotherconferencesArticle/Chapter ViewAbstractPublication PageseuroplopConference Proceedingsconference-collections
research-article

Problem-oriented security patterns for requirements engineering

Published:09 July 2014Publication History

ABSTRACT

Security is one essential quality requirement that needs to be addressed during the software development process. While quality requirements such as security are supposed to be the architectural drivers, architecture solutions such as security patterns represent design decisions on the architecture and design levels that in turn might constrain quality requirements significantly. Thus, knowledge which is gained in the solution space, for example from security patterns, should be reflected in the requirements engineering to obtain sound architectures and correct requirements. We propose to reuse security patterns in the requirements engineering in a systematic manner to equip requirement models with security solution approaches early in the software development process. To this end, we propose problem-oriented security patterns. Each problem-oriented security pattern consists of a three-part graphical pattern representing the functional problem which describes the functional requirement annotated with a security requirement, the solution to the security requirement, and the composition of them. In addition, we provide a template that captures the affect of applying the security solution on the requirement models.

References

  1. Alebrahim, A., Choppy, C., Fassbender, S., and Heisel, M. 2014. Optimizing functional and quality requirements according to stakeholders' goals. In System Quality and Software Architecture (SQSA). Elsevier, 75--120.Google ScholarGoogle Scholar
  2. Alebrahim, A., Hatebur, D., and Heisel, M. 2011a. A method to derive software architectures from quality requirements. In Proceedings of the 18th Asia-Pacific Software Engineering Conference (APSEC), T. D. Thu and K. Leung, Eds. IEEE Computer Society, 322--330. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Alebrahim, A., Hatebur, D., and Heisel, M. 2011b. Towards systematic integration of quality requirements into software architecture. In Proceedings of the 5th European Conference on Software Architecture (ECSA), I. Crnkovic, V. Gruhn, and M. Book, Eds. LNCS 6903. Springer Verlag, 17--25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Alebrahim, A., Heisel, M., and Meis, R. 2014. A structured approach for eliciting, modeling, and using quality-related domain knowledge. In Proceedings of the 14th International Conference on Computational Science and Its Applications (ICCSA). LNCS 8583. Springer, 370--386.Google ScholarGoogle Scholar
  5. Alebrahim, A., Tun, T. T., Yu, Y., Heisel, M., and Nuseibeh, B. 2012. An aspect-oriented approach to relating security requirements and access control. In Proceedings of the CAiSE Forum. CEUR Workshop Proceedings Series, vol. 855. CEUR-WS.org, 15--22.Google ScholarGoogle Scholar
  6. Beckers, K., Fassbender, S., and Heisel, M. 2013. A meta-model approach to the fundamentals for a pattern language for context elicitation. In Proceedings of the 18th European Conference on Pattern Languages of Programs (EuroPLoP). ACM, --. Accepted for Publication.Google ScholarGoogle Scholar
  7. Choppy, C., Hatebur, D., and Heisel, M. 2005. Architectural patterns for problem frames. IEE Proceedings -- Software, Special issue on Relating Software Requirements and Architecture 152, 4, 198--208.Google ScholarGoogle Scholar
  8. Chung, L., Nixon, B. A., Yu, E., and Mylopoulos, J. 2000. Non-functional requirements in software engineering. Klewer Academic.Google ScholarGoogle Scholar
  9. Côté, I., Hatebur, D., Heisel, M., Schmidt, H., and Wentzlaff, I. 2008. A Systematic Account of Problem Frames. In Proceedings of the European Conference on Pattern Languages of Programs (EuroPLoP). Universitätsverlag Konstanz, 749--767.Google ScholarGoogle Scholar
  10. Fowler, M. 1996. Analysis Patterns: Reusable Object Models. Addison Wesley. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Gamma, E., Helm, R., Johnson, R., and Vlissides, J. 1995. Design Patterns: Elements of Reusable Object-Oriented Software. Addison Wesley. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Hatebur, D. and Heisel, M. 2010a. Making Pattern- and Model-Based Software Development More Rigorous. In Proceedings of 12th International Conference on Formal Engineering Methods (ICFEM), J. S. Dong and H. Zhu, Eds. LNCS 6447. Springer Verlag, 253--269. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Hatebur, D. and Heisel, M. 2010b. A UML profile for requirements analysis of dependable software. In Proceedings of the International Conference on Computer Safety, Reliability and Security (SAFECOMP), E. Schoitsch, Ed. LNCS 6351. Springer Verlag, 317--331. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Hatebur, D., Heisel, M., and Schmidt, H. 2006. Security engineering using problem frames. In Proceedings of the International Conference on Emerging Trends in Information and Communication Security (ETRICS). Springer Verlag, 238--253. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Hatebur, D., Heisel, M., and Schmidt, H. 2007. A pattern system for security requirements engineering. In Proceedings of the 7th International Conference on Availability, Reliability and Security (AReS). IEEE Computer Society, Los Alamitos, CA, USA, 356--365. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Jackson, M. 2001. Problem Frames. Analyzing and structuring software development problems. Addison-Wesley. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Kreutzmann, H., Vollmer, S., Tekampe, N., and Abromeit, A. 2011a. Protection profile for the gateway of a smart metering system. Tech. rep., BSI.Google ScholarGoogle Scholar
  18. Kreutzmann, H., Vollmer, S., Tekampe, N., and Abromeit, A. 2011b. Protection profile for the security module of a smart metering system. Tech. rep., BSI.Google ScholarGoogle Scholar
  19. Lamsweerde, A. 2009a. Reasoning about alternative requirements options. In Conceptual Modeling: Foundations and Applications, A. Borgida, V. Chaudhri, P. Giorgini, and E. Yu, Eds. Vol. LNCS 5600. Springer, 380--397. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Lamsweerde, A. 2009b. Requirements Engineering: From System Goals to UML Models to Software Specifications. Wiley. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Laney, R., Barroca, L., Jackson, M., and Nuseibeh, B. 2004. Composing requirements using problem frames. In Proceedings of the 4th IEEE International Requirements Engineering Conference (RE). Press, 122--131. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Li, Y., Kobro Runde, R., and Stølen, K. 2013. A meta-model approach to the fundamentals for a pattern language for context elicitation. In Proceedings of the 20th Conference on Pattern Languages of Programs (PLOP).Google ScholarGoogle Scholar
  23. Nuseibeh, B. 2001. Weaving together requirements and architectures. IEEE Computer 34, 3, 115--117. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Rapanotti, L., Hall, J. G., Jackson, M., and Nuseibeh, B. 2004. Architecture-driven problem decomposition. In Proceedings of the 12th IEEE International Requirements Engineering Conference (RE). 80--89. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., and Sommerlad, P. 2005. Security patterns: integrating security and systems engineering. John Wiley & Sons. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Shaw, M. and Garlan, G. 1996. Software Aechitecture: Perspectives on an emerging discipline. Prentice Hall. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Whalen, M., Gacek, A., Cofer, D., Murugesan, A., Heimdahl, M., and Rayadurgam, S. 2013. Your "What" Is My "How": Iteration and Hierarchy in System Design. IEEE Software 30, 2, 54--60. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Yskout, K., Heyman, T., Scandariato, R., and Joosen, W. 2006. A system of security patterns. Report CW 469, K. U. Leuven, Department of Computer Science.Google ScholarGoogle Scholar

Index Terms

  1. Problem-oriented security patterns for requirements engineering

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              EuroPLoP '14: Proceedings of the 19th European Conference on Pattern Languages of Programs
              July 2014
              425 pages
              ISBN:9781450334167
              DOI:10.1145/2721956

              Copyright © 2014 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 9 July 2014

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              Overall Acceptance Rate216of354submissions,61%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader