16,294 research outputs found

    Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science

    Get PDF
    e-Science projects face a difficult challenge in providing access to valuable computational resources, data and software to large communities of distributed users. Oil the one hand, the raison d'etre of the projects is to encourage members of their research communities to use the resources provided. Oil the other hand, the threats to these resources from online attacks require robust and effective Security to mitigate the risks faced. This raises two issues: ensuring that (I) the security mechanisms put in place are usable by the different users of the system, and (2) the security of the overall system satisfies the security needs of all its different stakeholders. A failure to address either of these issues call seriously jeopardise the success of e-Science projects.The aim of this paper is to firstly provide a detailed understanding of how these challenges call present themselves in practice in the development of e-Science applications. Secondly, this paper examines the steps that projects can undertake to ensure that security requirements are correctly identified, and security measures are usable by the intended research community. The research presented in this paper is based Oil four case studies of c-Science projects. Security design traditionally uses expert analysis of risks to the technology and deploys appropriate countermeasures to deal with them. However, these case studies highlight the importance of involving all stakeholders in the process of identifying security needs and designing secure and usable systems.For each case study, transcripts of the security analysis and design sessions were analysed to gain insight into the issues and factors that surround the design of usable security. The analysis concludes with a model explaining the relationships between the most important factors identified. This includes a detailed examination of the roles of responsibility, motivation and communication of stakeholders in the ongoing process of designing usable secure socio-technical systems such as e-Science. (C) 2007 Elsevier Ltd. All rights reserved

    Evaluation Framework for Software Security Requirements Engineering Tools

    Get PDF
    Tarkvaraarenduses on nĂ”uded kui sĂŒsteemi vundament, mis vastutavad ka ebaĂ”nnestumiste eest. Valed nĂ”uded vĂ”ivad viia tarkvara eripĂ€radeni, mis tegelikult ei vasta spetsifikatsioonidele. Sel pĂ”hjusel peetakse nĂ”uete koostamist kĂ”ige keerulisemaks ja olulisemaks sammuks tarkvaraarenduse elutsĂŒkli kĂ”ikide protsesside jooksul. TĂ€napĂ€eval, kus kĂŒberrĂŒnnakud on \n\rtavalised, mĂ€ngivad turvalisuse nĂ”uded vĂ€ga olulist rolli tarkvaraarenduse protsessis. On levimas uut tĂŒĂŒpi tööriistad, mille kasutamist peetakse kĂ”ige efektiivsemaks meetodiks turvalisusnĂ”uete vĂ€ljatöötamisel. Lisaks vĂ”imaldavad need tööriistad lahendada turvalisusega seotud kĂŒsimusi kasutajal endal, hoides mĂ€rgatavalt kokku inseneride aega. Siiski on nende tööriistade \n\rareng alles algstaadiumis ning neid ei ole tarkvarainseneride poolt massiliselt kasutusele vĂ”etud. PĂ”hjus on vĂ€ga pikas uue tarkvara Ă”ppimise ja sellega kohanemise protsessis, mis pĂ”hjustab ajakadu arendusprotsessis ning lisab projektile kulusid. Projekti jaoks konkreetse tööriista valimisel vĂ”ib tutvumine ja katsetamine vĂ”tta inseneridel hulgaliselt aega. Lisaks sellele vĂ”ib struktureerimata valikuprotsess viia vale tööriista kasutuselevĂ”tmisele, mis raiskab omakorda kĂ”igi aega ja pingutusi. Selles uurimuses kavatseme me koostada struktureeritud lĂ€henemise, mis aitab insenere turvaliste tööriistade valimisel. Protsessile kaasaaitamiseks saavad analĂŒĂŒtikud ja arhitektid hinnata tarkvara omadusi, mida nad enda seisukohast olulisimateks peavad. Sellest lĂ€htuvalt saavad nad valida kindlate tööriistade vahel ning teha parima valiku. \n\rAntud uurimustöös konstrueeritud lĂ€henemisega on vĂ”imalik sÀÀsta aega, vaeva ja kulutusi. Uurimuse koostamise kĂ€igus uurime me tarkvaraarenduse turvaprotsesse, meetodeid ja tööriistu ning pĂŒĂŒame luua raamistikku, mis oleks inseneridele turvalisusnĂ”uete tööriistade hindamisel abiks.In software development requirements are considered as building blocks of software system, which also are considered to be responsible in event of failure. Bad requirements can lead to software features that are not to the specifications. For that reason requirement gathering process is considered as the most sensitive and complicated process among all software engineering lifecycle processes. In current age where cyber-attacks are common security requirements also comes into place and plays a very important role in software development process. In order to elicit security requirements new type of tools are begin to form a shape called security engineering tools which help in eliciting security requirements. That considered being the most efficient way of eliciting security requirements. Moreover these tools empower users with artifacts specifically to cater security needs, which save time and efforts for engineers in return. Nevertheless these tools are still at their infantry and are lacking mass adoption by software security engineers. Reason because these tools have steep learning curve which can add-up to development time and end up pushing more cost to the project. In order to decide which tool to select for a particular project require engineers to use these tools which in return will consume tremendous amount of time. Moreover using unstructured tool selection process can also leads to wrong tool selection which will be the waste of time and efforts. In this research work we are going to construct structured approach which will help engineers in security engineering tool selection process. In order to aid this process analysts and architects will be able to rate the features they want the most in a particular security engineering tool. In return from this process they will be able to choose between security engineering tools and select the best one. Finally using approach constructed in this research work will save time, efforts, and costs. In our approach we will analyze security engineering processes, methods and tools, to construct a framework that will help aid engineers in security engineering tool evaluation process

    Finding and Resolving Security Misusability with Misusability Cases

    Get PDF
    Although widely used for both security and usability concerns, scenarios used in security design may not necessarily inform the design of usability, and vice- versa. One way of using scenarios to bridge security and usability involves explicitly describing how design deci- sions can lead to users inadvertently exploiting vulnera- bilities to carry out their production tasks. This paper describes how misusability cases, scenarios that describe how design decisions may lead to usability problems sub- sequently leading to system misuse, address this problem. We describe the related work upon which misusability cases are based before presenting the approach, and illus- trating its application using a case study example. Finally, we describe some findings from this approach that further inform the design of usable and secure systems

    Requirements: The Key to Sustainability

    Get PDF
    Software's critical role in society demands a paradigm shift in the software engineering mind-set. This shift's focus begins in requirements engineering. This article is part of a special issue on the Future of Software Engineering
    • 

    corecore