loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Author: Dianxiang Xu

Affiliation: North Dakota State University, United States

Keyword(s): Software architecture, Security, Threat model, Use case, Misuse case, UML.

Related Ontology Subjects/Areas/Topics: Artificial Intelligence ; Business Process Management ; e-Business ; Enterprise Engineering ; Enterprise Information Systems ; Information Systems Analysis and Specification ; Knowledge Management and Information Sharing ; Knowledge-Based Systems ; Modeling Concepts and Information Integration Tools ; Symbolic Systems

Abstract: To deal with software security issues in the early stages of system development, this paper presents a threat-driven approach to the architectural design and analysis of secure information systems. In this approach, we model security threats to systems with misuse cases and mitigation requirements with mitigation use cases at the requirements analysis phase. Then we drive system architecture design (including the identification of architectural components and their connections) by use cases, misuse cases, and mitigation use cases. According to the misuse case-based threat model, we analyze whether or not a candidate architecture is resistant to the identified security threats and what constraints must be imposed on the choices of system implementation. This provides a smooth transition from requirements specification to high-level design and greatly improves the traceability of security concerns in high assurance information systems. We demonstrate our approach through a case study o n a security-intensive payroll information system. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.133.108.241

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Xu, D. (2005). THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS. In Proceedings of the Seventh International Conference on Enterprise Information Systems - Volume 3: ICEIS; ISBN 972-8865-19-8; ISSN 2184-4992, SciTePress, pages 233-239. DOI: 10.5220/0002552002330239

@conference{iceis05,
author={Dianxiang Xu.},
title={THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS},
booktitle={Proceedings of the Seventh International Conference on Enterprise Information Systems - Volume 3: ICEIS},
year={2005},
pages={233-239},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002552002330239},
isbn={972-8865-19-8},
issn={2184-4992},
}

TY - CONF

JO - Proceedings of the Seventh International Conference on Enterprise Information Systems - Volume 3: ICEIS
TI - THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS
SN - 972-8865-19-8
IS - 2184-4992
AU - Xu, D.
PY - 2005
SP - 233
EP - 239
DO - 10.5220/0002552002330239
PB - SciTePress