Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Security requirements engineering : designing secure socio-technical systems
Dalpiaz F., Paja E., Giorgini P., The MIT Press, Cambridge, MA, 2016. 224 pp. Type: Book (978-0-262034-21-0)
Date Reviewed: Oct 27 2016

Dalpiaz et al. set out to address both students and practitioners with this book.

Chapter 2 starts with a very high-level overview of computer and information security. The basic requirements--confidentiality, integrity, and availability--and composite requirements--authenticity, reliability, and accountability--are covered in a few paragraphs each. A few pages are dedicated to risk analysis and one section looks at security mechanisms. For an introductory chapter, it is acceptable, but one might argue that security mechanisms should be introduced only at a later stage.

Chapters 3 and 4 describe a modeling language for socio-technical security related to a European Union (EU) project (http://www.sts-tool.eu). This chapter goes into depth on how to model systems and is a good resource for students who use this methodology and tool for class assignments.

Building on these models, the security requirements engineer can then run some automated tests to check the model and to discover conflicts. Based on these checks (chapter 5), the authors describe a security method (chapter 6); in chapters 7 and 8, they show readers how to use it in case studies. The final 18 pages of the book briefly describe other approaches that could be used.

The book is well written and useful if you plan to use the methods and the tool developed in the EU project. For a general textbook on the subject, broader coverage of alternative methods and how, for instance, the unified modeling language (UML) might be used for the case studies would have been good.

Reviewer:  Edgar R. Weippl Review #: CR144880 (1702-0126)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (K.6.5 )
 
 
Model Development (I.6.5 )
 
 
Requirements/ Specifications (D.2.1 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy