Title | ||
---|---|---|
Towards Eliciting and Analyzing Security Requirements Using Ontologies through Use Case Scenarios (Work-in-Progress) |
Abstract | ||
---|---|---|
As our reliance on large, complex and ubiquitous software system increases, so does the devastating consequences that a cyberattack can have to modern society. Building secure software systems requires a greater need for secure software engineering approaches that can detect and address security vulnerabilities at the earliest stages of the software development life cycle. This paper presents an approach to facilitate the elicitation of cybersecurity requirements based on enhancing the widely adopted technique of use case modeling by incorporating the use of an ontology. The ontology will model the semantic relationship of cybersecurity requirements. Utilizing this ontology, we propose an approach that can be used to reuse and share cybersecurity requirements, providing a potential for the rapid discovery and correction of software vulnerabilities in the development process. |
Year | DOI | Venue |
---|---|---|
2018 | 10.1109/ICSSA45270.2018.00011 | 2018 International Conference on Software Security and Assurance (ICSSA) |
Keywords | DocType | ISBN |
Requirements Elicitation,Cybersecurity,Ontologies,Use Cases,Scenarios,SemanticWeb | Conference | 978-1-5386-9211-0 |
Citations | PageRank | References |
0 | 0.34 | 7 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Omar Ochoa | 1 | 10 | 5.19 |
Jessica Steinmann | 2 | 0 | 0.34 |
Yevgeniy Lischuk | 3 | 0 | 0.34 |