Using Security and Domain ontologies for Security Requirements ... - Hal

5 downloads 1159 Views 851KB Size Report
Sep 20, 2013 - importance of considering security during Requirements. Engineering (RE) ... in the RITA ontology are not specific to the target [bank] industry”. Experts ..... The input models contain many information about resources, some of ...
Using Security and Domain ontologies for Security Requirements Analysis Amina Souag, Camille Salinesi, Isabelle Wattiau, Haralambos Mouratidis

To cite this version: Amina Souag, Camille Salinesi, Isabelle Wattiau, Haralambos Mouratidis. Using Security and Domain ontologies for Security Requirements Analysis. The 8th IEEE International Workshop on Security, Trust and Privacy for Software Applications in conjunction with COMPSAC, the IEEE Signature Conference on Computers, Software & Application., Jul 2013, Kyoto, Japan. pp.1-7.

HAL Id: hal-00864300 https://hal-paris1.archives-ouvertes.fr/hal-00864300 Submitted on 20 Sep 2013

HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.

L’archive ouverte pluridisciplinaire HAL, est destin´ee au d´epˆot et `a la diffusion de documents scientifiques de niveau recherche, publi´es ou non, ´emanant des ´etablissements d’enseignement et de recherche fran¸cais ou ´etrangers, des laboratoires publics ou priv´es.

!"#$%&'()*+#,-&.$/&012.#$&1$,131%#("&41+&'()*+#,-& 5(6*#+(2($,"&7$.3-"#" !"#$%&'()%*+&,%"#--.&'%-#$./#+&,01+&&2%$345($&'(67($$.& 8$#9.6/#3:&& 2%6#/+&;6%$/%-#$./#?"%-#@>)$#9AB%6#/C>D6&& &

1/%7.--.&E%33#%)+&,FG01,A,H!I&J&F''F,&K)/#$.//& 'I()6%3#O#/M).->%)R

78",+.),!" #$%$&'" ($)$*(%+" +*)" *(,-$." */0-'" '+$" 1230('*&%$" 04" %0&)1.$(1&," )$%-(1'5" .-(1&," #$6-1($2$&')" 7&,1&$$(1&," 8#79" )'*,$:" ;1'$(*'-($" *&'0! I)-3#AP.9.-&G("%#$&T$3(-(*:&

N*(')"04".02*1&" 0&'0! 20T2T'1S1TH& T)6& ".34(O& *)#O./& 34.& O#/! I.34(O&T9.69#.L&&

G)6#$*&34.&O("%#$&/B.+&!//.3Y& XS%/R+&0.//()6&'0& UhV& !>& '()%*+& ,>& '%-#$./#+& .3& 1>& ,(":$AE%33#%)+& x&T$3(-(*#./& D(6& '.&\.[d>& UCeV&G>& K]z6$.6+& x&G("%#$& F$*#$..6#$*&y+& #$& 7)+ 4B5+ [!B5+ 5&3()6/,C+R&-0./&+]$0&,+()+B$3K.0&/+5-(&)-&C+0:&+4B5+[!B++ 5&/(&,+&\eeh>& UC[V&I>&'4#7%(R%+&N>&Q%#:%+&.3&I>&'%.R#+&x&oTT0F `&o(%-A T6#.$3.O&%$O&T$3(-(*:&G6#9.$&0.Z)#6.".$3/&F-#&\\g.\[d>& UCdV&N>& Q%#:%& .3& I>& '%.R#+& x&8/#$*& G("%#$& T$3(-(*:& %/& G("%#$& Q$(L-.O*.& D(6& 0.Z)#6.".$3/& F-#&'#$O6.+&.3&S>&I(/.6+&x&T$3(-(*:AK%/.O& ')BB(63& D(6& '.& G#--($+& ~O>& 'B6#$*.6& K.6-#$& N.#O.-7.6*+&\eC\+&B>&CndA\eh>& UCmV& & '>& G6#3/%/+& +& P>& o:"$(B()-(/+& I>& Q%6:O%+& S>& K%-(B()-(/+& '>& Q(R(-%R#/+& ,>& P%"76#$()O%R#/+& %$O& '>& Q%3/#R%/>& f!& R$(L-.O*.A7%/.O& %BB6(%

Suggest Documents