Hazard analysis for security protocol requirements

N Foster, J Jacob

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper describes a process for the generation and analysis of security protocol requirements. It addresses some of the problems resulting from the inadequacies of present development methods. It is based on a hazard analysis technique which has been developed for safety critical systems engineering. This provides a structured method of analysis of tile requirements whilst avoiding the problems of being too restrictive.

Original languageEnglish
Title of host publicationADVANCES IN NETWORK AND DISTRIBUTED SYSTEMS SECURITY
EditorsB DeDecker, F Piessens, J Smits, L VanHerrewhen
Place of PublicationNORWELL
PublisherKluwer
Pages75-92
Number of pages18
ISBN (Print)0-7923-7558-0
Publication statusPublished - 2001
Event1st Annual Working Conference on Network Security - LEUVEN
Duration: 26 Nov 200127 Nov 2001

Conference

Conference1st Annual Working Conference on Network Security
CityLEUVEN
Period26/11/0127/11/01

Keywords

  • security protocols
  • software engineering
  • requirements gathering and analysis
  • hazard analysis

Cite this