Secure requirements elicitation through triggered message sequence charts

  • Authors:
  • Arnab Ray;Bikram Sengupta;Rance Cleaveland

  • Affiliations:
  • Department of Computer Science SUNY at Stony Brook, Stony Brook, NY;IBM India Research Labaratory, Block-1, Indian Institute of Technology, Hauz Khas, New Delhi, India;Department of Computer Science SUNY at Stony Brook, Stony Brook, NY

  • Venue:
  • ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper argues for performing information-flow-based securityanalysis in the first phase of the software development life cycle itself ie in the requirements elicitation phase Message Sequence Charts (MSC)s have been widely accepted as a formal scenario-based visual notation for writing down requirements In this paper, we discuss a method for checking if a TMSC (Triggered Message Sequence Chart), a recently propsed enhancement to classical MSCs, satisifes one of the most important information flow properties namely non-interference.