Security requirements for tolerating security failures

5Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

This paper describes security failure-Tolerant requirements, which tolerate the failures of security services that protect applications from security attacks. A security service, such as authentication, confidentiality or integrity security service, can be always broken down as advanced attack skills are coined. There is no security service that is forever secure. This paper describes an approach to developing the security failure-Tolerant use case that specifies the security requirements for tolerating the breaches of security services. A security failure-Tolerant use case is modeled along with application use case and security use case, and specified with application use case description. Threats to applications are identified and modeled to develop security failure-Tolerant requirements. Online shopping system is used for illustrating security failure-Tolerant requirements.

Cite

CITATION STYLE

APA

Shin, M., & Pathirage, D. (2017). Security requirements for tolerating security failures. In Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE (pp. 487–490). Knowledge Systems Institute Graduate School. https://doi.org/10.18293/SEKE2017-098

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free