Computer aided threat identification

Y. Asnar, T. Li, F. Massacci, F. Paci

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

Recently, there has been an increase of reported security threats hitting organizations. Some of them are originated from the assignments to users of inappropriate permissions on organizational sensitive data. Thus it is crucial for organizations to recognize as early as possible the risks deriving by inappropriate access right management and to identify the solutions that they need to prevent such risks. In this paper, we propose a framework to identify threats during the requirements analysis of organizations' IT systems. With respect to other works which have attempted to include security analysis into requirement engineering process (e.g., KAOS, Elahi et al., Asnar et al.), our framework does not rely on the level of expertise of the security analyst to detect threats but allows to automatically identify threats that derive from inappropriate access management. To capture the organization's setting and the system stakeholders' requirements, we adopt SI* [1], a requirement engineering framework founded on the concepts of actors, goals, tasks and resources. This framework extends SI* with a reasoning technique that identifies potential security threats on resources and relevant goals. The reasoning is based on Answer Set Programming (ASP) logic rules that take into account the relationships between resources and the delegation of permission relations between actors. We illustrate this framework using an eHealth scenario. © 2011 IEEE.
Original languageEnglish
Title of host publicationProceedings - 13th IEEE International Conference on Commerce and Enterprise Computing, CEC 2011
Pages145-152
DOIs
Publication statusPublished - 2011
Externally publishedYes
Event13th IEEE International Conference on Commerce and Enterprise Computing, CEC 2011 - , Luxembourg
Duration: 5 Sept 20117 Sept 2011

Publication series

NameProceedings - 13th IEEE International Conference on Commerce and Enterprise Computing, CEC 2011

Conference

Conference13th IEEE International Conference on Commerce and Enterprise Computing, CEC 2011
Country/TerritoryLuxembourg
Period5/09/117/09/11

Fingerprint

Dive into the research topics of 'Computer aided threat identification'. Together they form a unique fingerprint.

Cite this