Unlock instant, AI-driven research and patent intelligence for your innovation.

A method of acquiring software security requirements by module security analysis

A security and demand technology, applied in the field of obtaining software security requirements by module security analysis, can solve the problems of lack of tracking relationship, non-disclosure of information, and lack of standardized expression of information interface, so as to achieve good management of information data and good security. Sexual needs analysis, the effect of convenient communication

Active Publication Date: 2018-07-17
BEIHANG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (2) Lack of establishing and maintaining the tracking relationship between software security requirements and system functional requirements
[0007] (3) In the process of complex system development, information is not disclosed due to restrictions such as contracts
Due to the contractual relationship, there is no standardized expression of the information interface between each other, so that in the process of security requirements analysis, the input is not perfect, resulting in incomplete requirement capture
[0008] (4) Lack of reasonable summary and classification of software security requirements
However, this classification ignores the consideration of safety integrity requirements and design constraints

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of acquiring software security requirements by module security analysis
  • A method of acquiring software security requirements by module security analysis
  • A method of acquiring software security requirements by module security analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Preferred embodiments of the present invention will be specifically described below in conjunction with the accompanying drawings, wherein the accompanying drawings constitute a part of the application and are used together with the embodiments of the present invention to explain the principle of the present invention.

[0057] Such as figure 1 as shown, figure 1 It is a schematic flow chart of the method described in the embodiment of the present invention, which may specifically include:

[0058] Step 101: For each subsystem, develop a module according to the requirement of safety analysis in the subsystem, and establish a corresponding safety analysis module;

[0059] Such as figure 2 As shown, the security analysis process is carried out in parallel with the system requirements development and design development process, and has a close corresponding relationship with it. After the requirements development has been carried out to a certain extent, design is carr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for obtaining software security requirements by module security analysis, comprising: for each subsystem, developing modules according to the requirements for security analysis in the subsystems, and establishing a corresponding security analysis module in a computer terminal ;According to the functional information and design decision information input from the database, conduct safety analysis on the system software or specific software of the subsystem, and generate a hazard analysis model; output software safety function requirements and corresponding design decisions to the requirements development module and design and development modules to form new demand development modules and design and development modules. The present invention establishes an information interface design suitable for multi-organization collaborative development of safety-critical systems; constructs system hazard analysis field model templates with reference to safety-related standards, and supports safety analysts to analyze system hazards and capture specific software safety in a systematic and structured manner sexual needs.

Description

technical field [0001] The invention relates to the technical field of computer software, in particular to a method for acquiring software safety requirements by module safety analysis. Background technique [0002] Software requirements describe the behavior, characteristics or attributes required by the system from the user's point of view, and are the bridge between users and developers. Accurate and complete requirements are the fundamental basis for guiding the subsequent analysis, modeling, development and testing of the system. Especially in the field of aviation, the incomplete capture of safety requirements for airborne software may cause significant property damage, damage the environment, and even endanger human life. Therefore, it is very necessary and urgent to study the security requirements acquisition of airborne software. [0003] There are certain similarities in the identification process of security requirements defined in existing research and standard...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F8/10G06Q10/06
Inventor 刘超郑培真杨海燕吴际
Owner BEIHANG UNIV