Skip to main content

A Foundation for Requirements Analysis of Dependable Software

  • Conference paper
Computer Safety, Reliability, and Security (SAFECOMP 2009)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 5775))

Included in the following conference series:

Abstract

We present patterns for expressing dependability requirements, such as confidentiality, integrity, availability, and reliability. The paper considers random faults as well as certain attacks and therefore supports a combined safety and security engineering. The patterns - attached to functional requirements - are part of a pattern system that can be used to identify missing requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Common Criteria for Information Technology Security Evaluation, Version 3.1 (September 2006), http://www.commoncriteriaportal.org/public/expert/

  2. Avizienis, A., Laprie, J.-C., Randall, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 1(1), 11–33 (2004), http://se2c.uni.lu/tiki/se2c-bib_download.php?id=2433

    Article  Google Scholar 

  3. Côté, I., Hatebur, D., Heisel, M., Schmidt, H., Wentzlaff, I.: A systematic account of problem frames. In: Proceedings of the European Conference on Pattern Languages of Programs (EuroPLoP 2007). Universitätsverlag Konstanz (2008)

    Google Scholar 

  4. Courtois, P.-J.: Safety, reliability and software based systems requirements. In: Contribution to the UK ACSNI Report of the Study Group on the safety of Operational Computer Systems (June 1997)

    Google Scholar 

  5. Gürses, S., Jahnke, J.H., Obry, C., Onabajo, A., Santen, T., Price, M.: Eliciting confidentiality requirements in practice. In: CASCON 2005: Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research, pp. 101–116. IBM Press (2005)

    Google Scholar 

  6. Hatebur, D., Heisel, M.: A foundation for requirements analysis of dependable software (technical report). Technical report, Universität Duisburg-Essen (2009), http://swe.uni-due.de/techrep/founddep.pdf

  7. Hatebur, D., Heisel, M., Schmidt, H.: Security engineering using problem frames. In: Müller, G. (ed.) ETRICS 2006. LNCS, vol. 3995, pp. 238–253. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  8. Hatebur, D., Heisel, M., Schmidt, H.: A pattern system for security requirements engineering. In: Werner, B. (ed.) Proceedings of the International Conference on Availability, Reliability and Security (AReS), IEEE Transactions, pp. 356–365. IEEE, Los Alamitos (2007)

    Chapter  Google Scholar 

  9. Hatebur, D., Heisel, M., Schmidt, H.: Analysis and component-based realization of security requirements. In: Proceedings of the International Conference on Availability, Reliability and Security (AReS), IEEE Transactions, pp. 195–203. IEEE, Los Alamitos (2008)

    Google Scholar 

  10. Hatebur, D., Heisel, M., Schmidt, H.: A formal metamodel for problem frames. In: Czarnecki, K., Ober, I., Bruel, J.-M., Uhl, A., Völter, M. (eds.) MODELS 2008. LNCS, vol. 5301, pp. 68–82. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  11. International Electrotechnical Commission IEC. Functional safety of electrical/electronic/programmable electronic safty-relevant systems (2000)

    Google Scholar 

  12. Jackson, M.: Problem Frames. Analyzing and structuring software development problems. Addison-Wesley, Reading (2001)

    Google Scholar 

  13. Jackson, M., Zave, P.: Deriving specifications from requirements: an example. In: Proceedings 17th Int. Conf. on Software Engineering, Seattle, USA, pp. 15–24. ACM Press, New York (1995)

    Google Scholar 

  14. Laprie, J.-C.: Dependability computing and fault tolerance: Concepts and terminology. Fault-Tolerant Computing – Highlights from Twenty-Five Years, 2–13 (June 1995), http://lion.ee.ntu.edu.tw/Class/FTDS_2008/Laprie-Definitions.pdf

  15. Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology. Technical report, TU Dresden and ULD Kiel, 5 (2006), http://dud.inf.tu-dresden.de/Anon_Terminology.shtml

  16. Røstad, L., Tøndel, I.A., Line, M.B., Nordland, O.: Safety vs. security. In: Stamatelatos, M.G., Blackman, H.S. (eds.) Safety Assessment and Management - PSAM 8, Eighth International Conference on Probabilistic. ASME Press, New York (2006)

    Google Scholar 

  17. Santen, T.: Stepwise development of secure systems. In: Górski, J. (ed.) SAFECOMP 2006. LNCS, vol. 4166, pp. 142–155. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hatebur, D., Heisel, M. (2009). A Foundation for Requirements Analysis of Dependable Software. In: Buth, B., Rabe, G., Seyfarth, T. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2009. Lecture Notes in Computer Science, vol 5775. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04468-7_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04468-7_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04467-0

  • Online ISBN: 978-3-642-04468-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics