• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种在需求工程方法学中高效识别安全威胁的方法。

An Efficient Identification of Security Threats in Requirement Engineering Methodology.

机构信息

Department of Computer Science and Engineering, Sri Eshwar College of Engineering, Coimbatore, Tamil Nadu, India.

出版信息

Comput Intell Neurosci. 2022 Aug 18;2022:1872079. doi: 10.1155/2022/1872079. eCollection 2022.

DOI:10.1155/2022/1872079
PMID:36035846
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9410943/
Abstract

Today, we completely rely on Information Technology (IT) applications for every aspect of daily life, including business and online transactions. In addition to using these IT-enabled applications for business purposes, we also use WhatsApp, Facebook, and a variety of other IT applications to communicate with others. However, there will undoubtedly be a drawback to every benefit. Since everything is linked to the Internet, there are many opportunities for security to be compromised. To address this, we are working to identify security threats early on in the software development process, specifically during the requirements phase. During the requirement engineering process, an engineer can recognize the security specifications in a more structured manner to create threat-free software. In our research work, we suggest the Identification of Security Threats during Requirement Engineering (ISTDRE) technique for detecting security risks throughout the requirement engineering process. The four points that make up this ISTDRE technique are Hack Point (HP), Speculation Point (SP), Trust Point (TP), and Reliable Point (RP). The new ISTDRE methodology will be validated using a case study of an ERP system involving two currently used methodologies: Model Oriented Security Requirements Engineering (MOSRE) and System Quality Requirements Engineering (SQUARE).

摘要

如今,我们的日常生活的方方面面都完全依赖信息技术(IT)应用,包括商业和在线交易。除了将这些 IT 应用用于商业目的外,我们还使用 WhatsApp、Facebook 和各种其他 IT 应用与他人进行沟通。然而,每个好处都无疑会有一个缺点。由于一切都与互联网相连,因此存在许多安全受到威胁的机会。为了解决这个问题,我们正在努力在软件开发过程的早期阶段识别安全威胁,特别是在需求阶段。在需求工程过程中,工程师可以以更结构化的方式识别安全规范,从而创建无威胁的软件。在我们的研究工作中,我们建议在需求工程中识别安全威胁(ISTDRE)技术,以在整个需求工程过程中检测安全风险。该 ISTDRE 技术由四个部分组成:黑客点(HP)、推测点(SP)、信任点(TP)和可靠点(RP)。新的 ISTDRE 方法将使用涉及两种当前使用方法的 ERP 系统案例研究进行验证:面向模型的安全需求工程(MOSRE)和系统质量需求工程(SQUARE)。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9991/9410943/e1b9dae1d23f/CIN2022-1872079.004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9991/9410943/54aac35eb3c9/CIN2022-1872079.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9991/9410943/ee53f4e07dc9/CIN2022-1872079.002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9991/9410943/2273da7d9718/CIN2022-1872079.003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9991/9410943/e1b9dae1d23f/CIN2022-1872079.004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9991/9410943/54aac35eb3c9/CIN2022-1872079.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9991/9410943/ee53f4e07dc9/CIN2022-1872079.002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9991/9410943/2273da7d9718/CIN2022-1872079.003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9991/9410943/e1b9dae1d23f/CIN2022-1872079.004.jpg

相似文献

1
An Efficient Identification of Security Threats in Requirement Engineering Methodology.一种在需求工程方法学中高效识别安全威胁的方法。
Comput Intell Neurosci. 2022 Aug 18;2022:1872079. doi: 10.1155/2022/1872079. eCollection 2022.
2
Capturing security requirements for software systems.捕获软件系统的安全需求。
J Adv Res. 2014 Jul;5(4):463-72. doi: 10.1016/j.jare.2014.03.001. Epub 2014 Mar 12.
3
SRE_BBC: A Self-Adaptive Security Enabled Requirements Engineering Approach for SLA Smart Contracts in Blockchain-Based Cloud Systems.SRE_BBC:一种基于区块链的云系统中 SLA 智能合约的自适应安全增强的需求工程方法。
Sensors (Basel). 2022 May 21;22(10):3903. doi: 10.3390/s22103903.
4
Modeling and verification of authentication threats mitigation in aspect-oriented mal sequence woven model.面向方面的恶意序列编织模型中的认证威胁缓解的建模与验证。
PLoS One. 2022 Jul 6;17(7):e0270702. doi: 10.1371/journal.pone.0270702. eCollection 2022.
5
A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development.基于模糊 TOPSIS 的可信医疗软件开发有效安全需求工程方法选择分析。
BMC Med Inform Decis Mak. 2020 Sep 18;20(1):236. doi: 10.1186/s12911-020-01209-8.
6
Automating risk analysis of software design models.自动化软件设计模型的风险分析。
ScientificWorldJournal. 2014;2014:805856. doi: 10.1155/2014/805856. Epub 2014 Jun 18.
7
A Framework for Cybersecurity Requirements Management in the Automotive Domain.汽车领域网络安全需求管理框架。
Sensors (Basel). 2023 May 22;23(10):4979. doi: 10.3390/s23104979.
8
Adoption of Deep-Learning Models for Managing Threat in API Calls with Transparency Obligation Practice for Overall Resilience.采用深度学习模型来管理 API 调用中的威胁,同时履行透明度义务,以实现全面的弹性。
Sensors (Basel). 2024 Jul 26;24(15):4859. doi: 10.3390/s24154859.
9
Smart Home-based IoT for Real-time and Secure Remote Health Monitoring of Triage and Priority System using Body Sensors: Multi-driven Systematic Review.基于智能家居的物联网,利用身体传感器实现分诊和优先级系统的实时安全远程健康监测:多驱动系统评价。
J Med Syst. 2019 Jan 15;43(3):42. doi: 10.1007/s10916-019-1158-z.
10
Common criteria related security design patterns for intelligent sensors--knowledge engineering-based implementation.智能传感器的通用相关安全设计模式——基于知识工程的实现。
Sensors (Basel). 2011;11(8):8085-114. doi: 10.3390/s110808085. Epub 2011 Aug 17.