A software security requirement acquisition method based on formal modeling

A formal modeling and software security technology, which is applied in the field of software security, can solve the problems of general user difficulties, unsatisfactory standardization and ease of use, etc.

Inactive Publication Date: 2019-02-26
GUANGXI UNIV FOR NATITIES
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing methods for obtaining security requirements, its degree of standardization and ease of use are not satisfactory. Because it is very large and involves a wide range of areas, it is quite difficult for ordinary users to fully understand its connotation. Yu security experts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A software security requirement acquisition method based on formal modeling
  • A software security requirement acquisition method based on formal modeling
  • A software security requirement acquisition method based on formal modeling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0031] see figure 1 , the present invention provides a technical solution: a method for obtaining software security requirements based on formal modeling, the specific steps of the method are as follows:

[0032] S1: Identify the resources and information contained in the software system;

[0033] S2: Identify potential threats to resources and information to meet the security needs of the software system. Potential threats to resources and information includ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a software security requirement acquisition method based on formal modeling in the technical field of software security. The specific steps of the method are as follows: S1, identifying resources and information contained in a software system; S2: identifying potential threat behaviors caused by resources and information; S3: establishing security objectives and proposing security requirements, and verifying the security requirements; 4, establishing a formal model and verifying that model; 5, describing various attributes and system behavior in that system to obtain afinal state, to realize the interpretation, evaluation and verification of the software system. The invention firstly identifies information in a software system, acquire the description of information security threat, determines whether the phenomenon description of problem domain meets the condition of security threat, establishes formal model and verifying, which makes up for the shortcomings of traditional security requirements analysis methods, and enables the requirements analysts to further capture the security requirements of software systems.

Description

technical field [0001] The invention discloses a method for obtaining software safety requirements based on formal modeling, and specifically relates to the technical field of software safety. Background technique [0002] With the widespread use of computers, software and information systems have penetrated into all walks of life, and play an important role in information equipment. However, software security issues come with high maintenance costs throughout the software life cycle, and these continuously increasing operating costs require organizations to carefully consider how they address software security issues. [0003] Software security requirements engineering can greatly improve the quality of developed software and reduce the cost of development and maintenance, but it has not yet attracted enough attention from the industry, and it also lacks comprehensive consideration of software assets, software defects, security objectives, threat analysis and risk assessmen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F8/10G06F11/36
CPCG06F8/10G06F11/3608G06F11/3612
Inventor 汤卫东刘美玲吴尽昭曲良东
Owner GUANGXI UNIV FOR NATITIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products