loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Joshua Pauli 1 and Dianxiang Xu 2

Affiliations: 1 College of Business and Information Systems, Dakota State University, United States ; 2 North Dakota State University, United States

Keyword(s): Software architecture, Security, Threat model, Use case, Misuse case, UML.

Related Ontology Subjects/Areas/Topics: Enterprise Information Systems ; Formal Methods ; Information Systems Analysis and Specification ; Methodologies and Technologies ; Methodologies, Processes and Platforms ; Model-Driven Software Development ; Operational Research ; Requirements Analysis And Management ; Security ; Simulation and Modeling ; Software Engineering ; Systems Engineering

Abstract: To deal with software security issues in the early stages of system development, this paper presents a threat-driven approach to the architectural design and analysis of secure information systems. In this approach, we model security threats to systems with misuse cases and mitigation requirements with mitigation use cases at the requirements analysis phase. Then we drive system architecture design (including the identification of architectural components and their connections) by use cases, misuse cases, and mitigation use cases. According to the misuse case-based threat model, we analyze whether or not a candidate architecture is resistant to the identified security threats and what constraints must be imposed on the choices of system implementation. This provides a smooth transition from requirements specification to high-level design and greatly improves the traceability of security concerns in high assurance information systems. We demonstrate our approach through a case study o n a security-intensive payroll information system. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.116.85.72

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Pauli, J. and Xu, D. (2005). THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS. In Proceedings of the Seventh International Conference on Enterprise Information Systems - Volume 3: ICEIS; ISBN 972-8865-19-8; ISSN 2184-4992, SciTePress, pages 136-143. DOI: 10.5220/0002549501360143

@conference{iceis05,
author={Joshua Pauli. and Dianxiang Xu.},
title={THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS},
booktitle={Proceedings of the Seventh International Conference on Enterprise Information Systems - Volume 3: ICEIS},
year={2005},
pages={136-143},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002549501360143},
isbn={972-8865-19-8},
issn={2184-4992},
}

TY - CONF

JO - Proceedings of the Seventh International Conference on Enterprise Information Systems - Volume 3: ICEIS
TI - THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS
SN - 972-8865-19-8
IS - 2184-4992
AU - Pauli, J.
AU - Xu, D.
PY - 2005
SP - 136
EP - 143
DO - 10.5220/0002549501360143
PB - SciTePress