Hazard Analysis for Security Protocol Requirements

作者: Nathalie Foster , Jeremy Jacob

DOI: 10.1007/0-306-46958-8_6

关键词:

摘要: This paper describes a process for the generation and analysis of security protocol requirements. It addresses some problems resulting from inadequacies present development methods. is based on hazard technique which has been developed safety critical systems engineering. provides structured method requirements whilst avoiding being too restrictive.

参考文章(14)
James Catmur, Morris Chudleigh, Felix Redmill, System Safety: HAZOP and Software HAZOP ,(1999)
Paul Syverson, Catherine Meadows, Formal requirements for key distribution protocols theory and application of cryptographic techniques. pp. 320- 331 ,(1994) , 10.1007/BFB0053447
A.I. Anton, Goal-based requirements analysis international conference on requirements engineering. pp. 136- 144 ,(1996) , 10.1109/ICRE.1996.491438
Ross J. Anderson, Why cryptosystems fail Communications of The ACM. ,vol. 37, pp. 32- 40 ,(1994) , 10.1145/188280.188291
C. Potts, K. Takahashi, A.I. Anton, Inquiry-based requirements analysis IEEE Software. ,vol. 11, pp. 21- 32 ,(1994) , 10.1109/52.268952
W. W. Royce, Managing the development of large software systems Proceedings of IEEE WESCON, 1970. pp. 1- 9 ,(1970)
A. van Lamsweerde, E. Letier, Handling obstacles in goal-oriented requirements engineering IEEE Transactions on Software Engineering. ,vol. 26, pp. 978- 1005 ,(2000) , 10.1109/32.879820