TY - GEN
T1 - Integrating formal analysis and design to preserve security properties
AU - Hassan, Riham
AU - Bohner, Shawn
AU - El-Kassas, Sherif
AU - Hinchey, Michael
PY - 2009
Y1 - 2009
N2 - The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended security properties remain largely unrealized on a repeatable and consistent basis. We present the FADES (Formal Analysis and Design approach for Engineering Security) that integrates KAOS (Knowledge Acquisition in autOmated Specifications) with the B specification language to derive security design specifications and further implementation from security requirements. We demonstrate the capability of the approach to handle changes to security requirements by introducing corrective changes to the security requirements of a case study, the spy network system. The objective is to bridge the gap between formal requirements and design for security requirements. Our initial results show promise with FADES in preserving security properties and detecting security vulnerabilities early during requirements. Encouraged by these, we are more quantitatively assessing the FADES capabilities.
AB - The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended security properties remain largely unrealized on a repeatable and consistent basis. We present the FADES (Formal Analysis and Design approach for Engineering Security) that integrates KAOS (Knowledge Acquisition in autOmated Specifications) with the B specification language to derive security design specifications and further implementation from security requirements. We demonstrate the capability of the approach to handle changes to security requirements by introducing corrective changes to the security requirements of a case study, the spy network system. The objective is to bridge the gap between formal requirements and design for security requirements. Our initial results show promise with FADES in preserving security properties and detecting security vulnerabilities early during requirements. Encouraged by these, we are more quantitatively assessing the FADES capabilities.
UR - http://www.scopus.com/inward/record.url?scp=78650760435&partnerID=8YFLogxK
U2 - 10.1109/HICSS.2009.267
DO - 10.1109/HICSS.2009.267
M3 - Conference contribution
AN - SCOPUS:78650760435
SN - 9780769534503
T3 - Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS
BT - Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS
T2 - 42nd Annual Hawaii International Conference on System Sciences, HICSS
Y2 - 5 January 2009 through 9 January 2009
ER -