Skip to main content

Using Special Use Cases for Security in the Software Development Life Cycle

  • Conference paper
Information Security Applications (WISA 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6513))

Included in the following conference series:

Abstract

The goal of this paper is to propose the use of the Misuse Case and Obligation use case concepts in the Software Development Life Cycle (SDLC) in order to position security concerns at the very beginning of this process and to get “secure applications”. These concepts are built upon the “use case” concept which is well known by the community of application developers in companies and by the application sponsors. The application sponsors are the key business stakeholders that fund and/or rely on the application for their business benefits. As stated in [1] and [3], the use case concept has proven helpful for the elicitation of, communication about and documentation of requirements [4]. So, we think it is easier to introduce security requirements in the development lifecycle by reusing and/or constructing security requirement artifacts around the use case and UML approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Al-Azzani, S.: Security Testing - RSMG 2 (2009), http://www.cs.bham.ac.uk

  2. Bettini, C., Jajodia, S., Wang, S., Wijesekera, D.: Provisions and obligations in policy management and security applications. In: Proceedings of the 28th International Conference on Very Large Data Bases, VLDB Endowment, Hong Kong, pp. 502–513 (2002)

    Google Scholar 

  3. Devambu, P.T., Stubbelbine, S.: Software engineering for security: a roadmap. In: Future of Software Engineering, Special volume of the Proceedings of the 22nd Int. Conf. on Software Engineering (ICSE 2000), pp. 227–239 (2000)

    Google Scholar 

  4. Firesmith, D.: Security Use Cases. Journal of Object Technology 2(3), 53–64 (2003)

    Article  Google Scholar 

  5. European Union: Directive 2004/39/EC on The Markets in Financial Instruments Directive (MiFID). Official Journal of the European Union (2004), http://eurlex.europa.eu

  6. European Union : Directive 2005/60/EC on the prevention of the use of the financial system for the purpose of money laundering and terrorist financing; Official Journal of the European Union (2005), http://eurlex.europa.eu

  7. Giorgini, P., Massacci, F., Mylopoulos, J.: Requirement Engineering meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard. In: 22th of International Conference on Conceptual Modeling (2003)

    Google Scholar 

  8. Giorgini, P., Massacci, F., Zannone, N.: Security and Trust Requirements Engineering; survey. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2005. LNCS, vol. 3655, pp. 237–272. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. Jürjens, J.: Modelling audit security for smart-card payment schemes with UMLsec. In: 16th Int. Conf.on Inf. Security (IFIP/SEC 2001). Kluwer AP, Dordrecht (2001)

    Google Scholar 

  10. Jürjens, J.: Towards secure systems development with umlsec. In: FASE/ETAPS 2001. LNCS, vol. 2029, pp. 187–200. Springer, Heidelberg (2001)

    Google Scholar 

  11. Kabasele-Tenday, J.-M.: Specifying Security in a Composite System. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol. 1396, pp. 246–255. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  12. Kalam, E., et al.: Organization based access control. In: Proceedings of the 4th Int. Workshop on Policies for Distributed Systems and Networks (POLICY 2003). IEEE, Los Alamitos (2003)

    Google Scholar 

  13. Kalam, E., et al.: Multi-OrBAC: un modèle de contrôle d’accès pour les systèmes multi-organisationnels. Centre pour la Communication Scientifique Directe (2006), http://www.ccsd.cnrs.fr/

  14. van Lamsweerde, A., Letier, E.: Handling Obstacles in Goal-Oriented Requirements Engineering. TSE 26(10), 978–1005 (2000)

    Google Scholar 

  15. van Lamsweerde, A., Brohez, S., De Landtsheer, R.: Janssens. D.: From System Goals to Intruder Anti-Goals: Attack Generation and Resolution for Security Requirements Engineering. In: Proceedings of RHAS 2003, pp. 49–56 (2003)

    Google Scholar 

  16. Leiwo, J., Zheng, Y.: A Framework for the Management of Information Security. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol. 1396, pp. 232–245. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  17. Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Li, J., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426–441. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  18. Matulevičius, R., Mayer, N., Mouratidis, H., Dubois, E., Heymans, P., Genon, N.: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development. In: Bellahsène, Z., Léonard, M. (eds.) CAiSE 2008. LNCS, vol. 5074, pp. 541–555. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  19. Matulevicius, R., Mayer, N., Heymans, P.: Alignment of Misuse Cases with Security Risk Management. In: ARES Proceedings of the 2008 Third Int. Conf. on Availability, Reliability and Security. IEEE, Los Alamitos (2008)

    Google Scholar 

  20. Mayer, N., Heymans, P., Matulevičius, R.: Design of a Modelling Language for Information System Security Risk Management. In: Proceedings of the 1st International Conf. on Research Challenges in Information Science (RCIS 2007), pp. 121–131 (2007)

    Google Scholar 

  21. McDermott, J., Fox, C.: Using Abuse Case Models for Security Requirements Analysis. In: Proc. of ACSAC 1999, pp. 55–66. IEEE Press, Los Alamitos (1999)

    Google Scholar 

  22. Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requirements Engineering 10(1), 34–44 (2005)

    Article  Google Scholar 

  23. Wing, J.M.: A Symbiotic Relationship Between Formal Methods and Security, CMU-CS-98-188, Pittsburgh, PA (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kabasele Tenday, JM. (2011). Using Special Use Cases for Security in the Software Development Life Cycle. In: Chung, Y., Yung, M. (eds) Information Security Applications. WISA 2010. Lecture Notes in Computer Science, vol 6513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17955-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17955-6_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17954-9

  • Online ISBN: 978-3-642-17955-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics