Maintaining security requirements of software systems using evolving crosscutting dependencies

0Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security requirements are concerned with protecting assets of a system from harm. Implemented as code aspects to weave protection mechanisms into the system, security requirements need to be validated when changes are made to the programs during system evolution. However, it was not clear for developers whether existing validation procedures such as test cases are sufficient for security and when the implemented aspects need to adapt. In this chapter, we propose an approach for detecting any change to the satisfaction of security requirements in three steps: (1) identify the asset variables in the systems that are only accessed by a join-point method, (2) trace these asset variables to identify both control and data dependencies between the non-aspect and aspect functions and (3) update the test cases according to implementation of these dependencies to strengthen the protection when a change happens. These steps are illustrated by a case study of a meeting scheduling system where security is a critical concern.

Cite

CITATION STYLE

APA

Saleem, S. B., Montrieux, L., Yu, Y., Tun, T. T., & Nuseibeh, B. (2013). Maintaining security requirements of software systems using evolving crosscutting dependencies. In Aspect-Oriented Requirements Engineering (Vol. 9783642386404, pp. 167–181). Springer-Verlag Berlin Heidelberg. https://doi.org/10.1007/978-3-642-38640-4_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free