Using requirements engineering in an automatic security policy derivation process

  • Mariem Graa
  • , Nora Cuppens-Boulahia
  • , Fabien Autrel
  • , Hanieh Azkia
  • , Frédéric Cuppens
  • , Gouenou Coatrieux
  • , Ana Cavalli
  • , Amel Mammar

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Traditionally, a security policy is defined from an informal set of requirements, generally written using natural language. It is then difficult to appreciate the compatibility degree of the manually generated security policy with the informal requirements definition. The idea of this paper is to automate the process of deriving the formal security policy, using a more structured specification of the security objectives issued by the administrator of the information system to be secured. We chose the goal-oriented methodology KAOS to express the functional objectives, then based on the results of a risk analysis, we integrate the security objectives to the obtained KAOS framework. Finally, through a process of transformation applied to this structured security objectives specification, we automatically generate the corresponding security policy. This policy is consistent with the access control model OrBAC (Organization Access Control).

Original languageEnglish
Title of host publicationData Privacy Management and Autonomous Spontaneous Security - 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Revised Selected Papers
PublisherSpringer Verlag
Pages155-172
Number of pages18
ISBN (Print)9783642288784
DOIs
Publication statusPublished - 1 Jan 2012
Event6th International Workshop on Data Privacy Management, DPM 2011 and 4th SETOP International Workshop on Autonomous and Spontaneous Security, SETOP 2011 - Leuven, Belgium
Duration: 15 Sept 201116 Sept 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7122 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th International Workshop on Data Privacy Management, DPM 2011 and 4th SETOP International Workshop on Autonomous and Spontaneous Security, SETOP 2011
Country/TerritoryBelgium
CityLeuven
Period15/09/1116/09/11

Keywords

  • KAOS
  • OrBAC
  • Requirement engineering
  • Security policy

Fingerprint

Dive into the research topics of 'Using requirements engineering in an automatic security policy derivation process'. Together they form a unique fingerprint.

Cite this