Skip to main content

An Ontology Based Information Security Requirements Engineering Framework

  • Conference paper
Book cover Secure and Trust Computing, Data Management and Applications (STA 2011)

Abstract

Software Requirement Specification (SRS) is frequently evolving to reflect requirements change during project development. Therefore, it needs enhancement to facilitate its authoring and reuse. This paper proposes a framework for building a part of SRS related to information security requirements (ISRs) using ontologies. Such a framework allows ensuring ISRs traceability and reuse. The framework uses three kinds of generic ontologies as a solution to this problem - software requirement ontology, application domain ontology, information security ontology. We propose to enhance SRS by associating the ISR with specific entities within ontologies. We aim to facilitate a semantic-based interpretation of ISRs by restricting their interpretation through the three previous ontologies. Semantic form is used to improve our ability to create, manage, and maintain ISRs. We anticipate that the proposed framework would be very helpful for requirements engineers to create and understand the ISRs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Happel, H.J., Seedorf, S.: Applications of Ontologies in Software Engineering. In: Proceedings of the International Workshop on Semantic Web Enabled Software Engineering, SWESE (2006)

    Google Scholar 

  2. Decker, B., Rech, J., Ras, E., Klein, B., Hoecht, C.: Self Organized Reuse of Software Engineering Knowledge Supported by Semantic Wikis. In: Proceedings of the Workshop on Semantic Web Enabled Software Engineering (SWESE) (November 2005)

    Google Scholar 

  3. Ayank, V., Kositsyna, N., Austin, M.: Requirements Engineering and the Semantic Web, Representation, Management, and Validation of Requirements and System-Level Architectures. Technical Report, Part II, TR 2004-14, University of Maryland (2004)

    Google Scholar 

  4. Wouters, B., Deridder, D., Van Paesschen, E.: The Use of Ontologies as a Backbone for Use Case Management. In: Proceedings of the European Conference on Object-Oriented Programming (ECOOP), Workshop: Objects and Classifications, A Natural Convergence (2000)

    Google Scholar 

  5. Asheras, J., Valencia-García, R., Fernández-Breis, J.T., Toval, A.: Modelling Reusable Security Requirements based on an Ontology Framework. Journal of Research and Practice in Information Technology 41(2) (May 2009)

    Google Scholar 

  6. Kaiya, H., Saeki, M.: Using Domain Ontology as Domain Knowledge for Requirements Elicitation. In: Proceedings of the IEEE International Requirement Engineering Conference, pp. 186–195 (2006)

    Google Scholar 

  7. Yanwu, Y., Xia, F., Zhang, W., Xiao, X., Li, Y., Li, X.: Towards Semantic Requirement Engineering, Semantic Computing and Systems. In: IEEE International Workshop on Semantic Computing and Systems, pp. 67–71 (2008)

    Google Scholar 

  8. Cheng, B.H.C., Atlee, J.M.: Research Directions in Requirements Engineering. In: Future of Software Engineering (FOSE), in ICSE, pp. 285–303. IEEE Computer Society, Minneapolis (2007)

    Chapter  Google Scholar 

  9. Sommerville, I.: Software Engineering. Pearson Education, London (2011)

    MATH  Google Scholar 

  10. Bourque, P., Dupuis, R. (eds.): Guide to the Software Engineering Body of Knowledge. IEEE Computer Society, Los Alamitos (2004)

    Google Scholar 

  11. Pohl, K.: Requirements Engineering - Grundlagen, Prinzipien, Techniken. Dpunkt Verlag (2007)

    Google Scholar 

  12. ISO27002, ISO/IEC 17799-27002 Code of Practice for Information Security Management (2005)

    Google Scholar 

  13. Mead, N.R.: Security Requirements Engineering (2006), https://buildsecurityin.us-cert.gov/bsi/articles/best-practices/requirements/243-BSI.html

  14. Tsoumas, B., Gritzalis, D.: Towards an Ontology based Security Management. In: Proceedings of the 20th International Conference on Advanced Information Networking and Applications. IEEE Computer Society, Los Alamitos (2006)

    Google Scholar 

  15. Fenz, S., Ekelhart, A.: Formalizing information security knowledge. In: Proceedings of the ACM Symposium on Information, Computer and Communications Security (2009)

    Google Scholar 

  16. IST. An Introduction to Computer Security – The NIST Handbook. Technical report, NIST (National Institute of Standards and Technology) (October 1995); Special Publication 800-12

    Google Scholar 

  17. Lauesen, S.: Software Requirements - Styles and Techniques. Addison-Wesley, Reading (2002)

    Google Scholar 

  18. Lee, S.-W., Gandhi, R., Muthurajan, D., Yavagal, D., Ahn, G.-J.: Building Problem Domain Ontology from Security Requirements in Regulatory Documents. In: Proceedings of the International Workshop on Software Engineering for Secure Systems (2006)

    Google Scholar 

  19. Popov, B., Kiryakov, A., Ognyanoff, D., Manov, D., Kirilov, A.: KIM – A Semantic Platform for Information Extraction and Retrieval. Journal of Natural Language Engineering 10(3-4), 375–392 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chikh, A., Abulaish, M., Nabi, S.I., Alghathbar, K. (2011). An Ontology Based Information Security Requirements Engineering Framework. In: Park, J.J., Lopez, J., Yeo, SS., Shon, T., Taniar, D. (eds) Secure and Trust Computing, Data Management and Applications. STA 2011. Communications in Computer and Information Science, vol 186. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22339-6_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22339-6_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22338-9

  • Online ISBN: 978-3-642-22339-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics