Security Requirement Modeling Support System Using Software Security Knowledge Base

Atsuo Hazeyama, Shun'Ichi Tanaka, Takafumi Tanaka, Hiroaki Hashiura, Seiji Munetoh, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, Nobukazu Yoshioka

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    With the growing number of services on the Internet, the need for secure software development has increased. It is required for secure software development to consider security in the whole development life cycle. It is indispensable for secure software development to use various types of security knowledge. This study deals with security requirement analysis. Existing security requirements modeling systems do not provide a function to create an artifact while referring to security knowledge in an integrated manner. In this paper, the authors develop a modeling support system for a misuse case diagram that enables the association of knowledge with elements that constitute the diagram. The results of an experiment using the system show the system's usefulness in both the integration of the knowledge base with the artifact creation environment and the association of the knowledge with the elements of the diagram.

    Original languageEnglish
    Title of host publicationProceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018
    EditorsClaudio Demartini, Sorel Reisman, Ling Liu, Edmundo Tovar, Hiroki Takakura, Ji-Jiang Yang, Chung-Horng Lung, Sheikh Iqbal Ahamed, Kamrul Hasan, Thomas Conte, Motonori Nakamura, Zhiyong Zhang, Toyokazu Akiyama, William Claycomb, Stelvio Cimato
    PublisherIEEE Computer Society
    Pages234-239
    Number of pages6
    Volume2
    ISBN (Electronic)9781538626665
    DOIs
    Publication statusPublished - 2018 Jun 8
    Event42nd IEEE Computer Software and Applications Conference, COMPSAC 2018 - Tokyo, Japan
    Duration: 2018 Jul 232018 Jul 27

    Other

    Other42nd IEEE Computer Software and Applications Conference, COMPSAC 2018
    CountryJapan
    CityTokyo
    Period18/7/2318/7/27

    Fingerprint

    Software engineering
    Life cycle
    Internet
    Experiments

    Keywords

    • Knowledge base for secure software development
    • Modeling support system
    • Secure software development support
    • Security requirements analysis

    ASJC Scopus subject areas

    • Software
    • Computer Science Applications

    Cite this

    Hazeyama, A., Tanaka, SI., Tanaka, T., Hashiura, H., Munetoh, S., Okubo, T., ... Yoshioka, N. (2018). Security Requirement Modeling Support System Using Software Security Knowledge Base. In C. Demartini, S. Reisman, L. Liu, E. Tovar, H. Takakura, J-J. Yang, C-H. Lung, S. I. Ahamed, K. Hasan, T. Conte, M. Nakamura, Z. Zhang, T. Akiyama, W. Claycomb, ... S. Cimato (Eds.), Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018 (Vol. 2, pp. 234-239). [8377863] IEEE Computer Society. https://doi.org/10.1109/COMPSAC.2018.10235

    Security Requirement Modeling Support System Using Software Security Knowledge Base. / Hazeyama, Atsuo; Tanaka, Shun'Ichi; Tanaka, Takafumi; Hashiura, Hiroaki; Munetoh, Seiji; Okubo, Takao; Kaiya, Haruhiko; Washizaki, Hironori; Yoshioka, Nobukazu.

    Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018. ed. / Claudio Demartini; Sorel Reisman; Ling Liu; Edmundo Tovar; Hiroki Takakura; Ji-Jiang Yang; Chung-Horng Lung; Sheikh Iqbal Ahamed; Kamrul Hasan; Thomas Conte; Motonori Nakamura; Zhiyong Zhang; Toyokazu Akiyama; William Claycomb; Stelvio Cimato. Vol. 2 IEEE Computer Society, 2018. p. 234-239 8377863.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Hazeyama, A, Tanaka, SI, Tanaka, T, Hashiura, H, Munetoh, S, Okubo, T, Kaiya, H, Washizaki, H & Yoshioka, N 2018, Security Requirement Modeling Support System Using Software Security Knowledge Base. in C Demartini, S Reisman, L Liu, E Tovar, H Takakura, J-J Yang, C-H Lung, SI Ahamed, K Hasan, T Conte, M Nakamura, Z Zhang, T Akiyama, W Claycomb & S Cimato (eds), Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018. vol. 2, 8377863, IEEE Computer Society, pp. 234-239, 42nd IEEE Computer Software and Applications Conference, COMPSAC 2018, Tokyo, Japan, 18/7/23. https://doi.org/10.1109/COMPSAC.2018.10235
    Hazeyama A, Tanaka SI, Tanaka T, Hashiura H, Munetoh S, Okubo T et al. Security Requirement Modeling Support System Using Software Security Knowledge Base. In Demartini C, Reisman S, Liu L, Tovar E, Takakura H, Yang J-J, Lung C-H, Ahamed SI, Hasan K, Conte T, Nakamura M, Zhang Z, Akiyama T, Claycomb W, Cimato S, editors, Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018. Vol. 2. IEEE Computer Society. 2018. p. 234-239. 8377863 https://doi.org/10.1109/COMPSAC.2018.10235
    Hazeyama, Atsuo ; Tanaka, Shun'Ichi ; Tanaka, Takafumi ; Hashiura, Hiroaki ; Munetoh, Seiji ; Okubo, Takao ; Kaiya, Haruhiko ; Washizaki, Hironori ; Yoshioka, Nobukazu. / Security Requirement Modeling Support System Using Software Security Knowledge Base. Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018. editor / Claudio Demartini ; Sorel Reisman ; Ling Liu ; Edmundo Tovar ; Hiroki Takakura ; Ji-Jiang Yang ; Chung-Horng Lung ; Sheikh Iqbal Ahamed ; Kamrul Hasan ; Thomas Conte ; Motonori Nakamura ; Zhiyong Zhang ; Toyokazu Akiyama ; William Claycomb ; Stelvio Cimato. Vol. 2 IEEE Computer Society, 2018. pp. 234-239
    @inproceedings{2b2558b75b3a412ba1a2aafe6a028464,
    title = "Security Requirement Modeling Support System Using Software Security Knowledge Base",
    abstract = "With the growing number of services on the Internet, the need for secure software development has increased. It is required for secure software development to consider security in the whole development life cycle. It is indispensable for secure software development to use various types of security knowledge. This study deals with security requirement analysis. Existing security requirements modeling systems do not provide a function to create an artifact while referring to security knowledge in an integrated manner. In this paper, the authors develop a modeling support system for a misuse case diagram that enables the association of knowledge with elements that constitute the diagram. The results of an experiment using the system show the system's usefulness in both the integration of the knowledge base with the artifact creation environment and the association of the knowledge with the elements of the diagram.",
    keywords = "Knowledge base for secure software development, Modeling support system, Secure software development support, Security requirements analysis",
    author = "Atsuo Hazeyama and Shun'Ichi Tanaka and Takafumi Tanaka and Hiroaki Hashiura and Seiji Munetoh and Takao Okubo and Haruhiko Kaiya and Hironori Washizaki and Nobukazu Yoshioka",
    year = "2018",
    month = "6",
    day = "8",
    doi = "10.1109/COMPSAC.2018.10235",
    language = "English",
    volume = "2",
    pages = "234--239",
    editor = "Claudio Demartini and Sorel Reisman and Ling Liu and Edmundo Tovar and Hiroki Takakura and Ji-Jiang Yang and Chung-Horng Lung and Ahamed, {Sheikh Iqbal} and Kamrul Hasan and Thomas Conte and Motonori Nakamura and Zhiyong Zhang and Toyokazu Akiyama and William Claycomb and Stelvio Cimato",
    booktitle = "Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018",
    publisher = "IEEE Computer Society",

    }

    TY - GEN

    T1 - Security Requirement Modeling Support System Using Software Security Knowledge Base

    AU - Hazeyama, Atsuo

    AU - Tanaka, Shun'Ichi

    AU - Tanaka, Takafumi

    AU - Hashiura, Hiroaki

    AU - Munetoh, Seiji

    AU - Okubo, Takao

    AU - Kaiya, Haruhiko

    AU - Washizaki, Hironori

    AU - Yoshioka, Nobukazu

    PY - 2018/6/8

    Y1 - 2018/6/8

    N2 - With the growing number of services on the Internet, the need for secure software development has increased. It is required for secure software development to consider security in the whole development life cycle. It is indispensable for secure software development to use various types of security knowledge. This study deals with security requirement analysis. Existing security requirements modeling systems do not provide a function to create an artifact while referring to security knowledge in an integrated manner. In this paper, the authors develop a modeling support system for a misuse case diagram that enables the association of knowledge with elements that constitute the diagram. The results of an experiment using the system show the system's usefulness in both the integration of the knowledge base with the artifact creation environment and the association of the knowledge with the elements of the diagram.

    AB - With the growing number of services on the Internet, the need for secure software development has increased. It is required for secure software development to consider security in the whole development life cycle. It is indispensable for secure software development to use various types of security knowledge. This study deals with security requirement analysis. Existing security requirements modeling systems do not provide a function to create an artifact while referring to security knowledge in an integrated manner. In this paper, the authors develop a modeling support system for a misuse case diagram that enables the association of knowledge with elements that constitute the diagram. The results of an experiment using the system show the system's usefulness in both the integration of the knowledge base with the artifact creation environment and the association of the knowledge with the elements of the diagram.

    KW - Knowledge base for secure software development

    KW - Modeling support system

    KW - Secure software development support

    KW - Security requirements analysis

    UR - http://www.scopus.com/inward/record.url?scp=85055566296&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=85055566296&partnerID=8YFLogxK

    U2 - 10.1109/COMPSAC.2018.10235

    DO - 10.1109/COMPSAC.2018.10235

    M3 - Conference contribution

    AN - SCOPUS:85055566296

    VL - 2

    SP - 234

    EP - 239

    BT - Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018

    A2 - Demartini, Claudio

    A2 - Reisman, Sorel

    A2 - Liu, Ling

    A2 - Tovar, Edmundo

    A2 - Takakura, Hiroki

    A2 - Yang, Ji-Jiang

    A2 - Lung, Chung-Horng

    A2 - Ahamed, Sheikh Iqbal

    A2 - Hasan, Kamrul

    A2 - Conte, Thomas

    A2 - Nakamura, Motonori

    A2 - Zhang, Zhiyong

    A2 - Akiyama, Toyokazu

    A2 - Claycomb, William

    A2 - Cimato, Stelvio

    PB - IEEE Computer Society

    ER -