A comparison of approaches for modeling software security requirements using unified modeling language extensions
The unified modeling language (UML) supports extension mechanisms called stereo-types, tagged values, and constraints to extend its modeling capabilities. These extension mechanisms are utilized to create new and customized profiles. Their applications in modeling emerging security requirements are...
Saved in:
Published in | International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering Vol. 15; no. 3; p. 2911 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
01.06.2025
|
Online Access | Get full text |
ISSN | 2088-8708 2722-256X 2722-2578 2722-2578 |
DOI | 10.11591/ijece.v15i3.pp2911-2927 |
Cover
Summary: | The unified modeling language (UML) supports extension mechanisms called stereo-types, tagged values, and constraints to extend its modeling capabilities. These extension mechanisms are utilized to create new and customized profiles. Their applications in modeling emerging security requirements are discussed. To model authentication, availability, integrity, access control, confidentiality, data integrity, non-repudiation, authorization, encryption, hashing, and session mechanisms, a set of novel stereotypes is proposed in this paper. The proposed stereotypes inherit from baseline security requirements. Further, security concepts within the UML diagram are represented using these stereotypes. In addition, the proposed stereotypes were evaluated with the help of human subject evaluation using real-world scenarios to illustrate the usefulness of these stereotypes in modelling security requirements. The contribution of this paper is a stereotyped model security requirements and library of existing security notations with high quality symbols which can be incorporated in existing and new stereotypes and diagrams to facilitate the process of security requirement modelling. Results indicate that the proposed stereotyped model improves the modeling process of security requirements. It also provides a better representation of emerging security mechanisms in software design. Finally, during the software development process, stakeholders enjoy improved communication and understanding of security requirements. |
---|---|
ISSN: | 2088-8708 2722-256X 2722-2578 2722-2578 |
DOI: | 10.11591/ijece.v15i3.pp2911-2927 |