<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A Tool for Managing Evolving Security Requirements</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Gábor</forename><surname>Bergmann</surname></persName>
							<email>bergmann@mit.bme.hu</email>
							<affiliation key="aff0">
								<orgName type="institution">DMIS -Budapest University of Technology and Economics</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Fabio</forename><surname>Massacci</surname></persName>
							<email>fabio.massacci@unitn.it</email>
							<affiliation key="aff1">
								<orgName type="institution">DISI -University of Trento</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Federica</forename><surname>Paci</surname></persName>
							<email>federica.paci@unitn.it</email>
							<affiliation key="aff1">
								<orgName type="institution">DISI -University of Trento</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Thein</forename><surname>Tun</surname></persName>
							<affiliation key="aff2">
								<orgName type="institution">DC -The Open University</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Dániel</forename><surname>Varró</surname></persName>
							<email>varro@mit.bme.hu</email>
							<affiliation key="aff0">
								<orgName type="institution">DMIS -Budapest University of Technology and Economics</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Yijun</forename><surname>Yu</surname></persName>
							<email>y.yu@open.ac.uk</email>
							<affiliation key="aff2">
								<orgName type="institution">DC -The Open University</orgName>
							</affiliation>
						</author>
						<title level="a" type="main">A Tool for Managing Evolving Security Requirements</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">2854D0D23CF63D8FDB7866DB17861D4C</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T03:23+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>security requirements engineering</term>
					<term>secure i*</term>
					<term>security argumentation</term>
					<term>change impact analysis</term>
					<term>security patterns</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Requirements evolution management is a daunting process. Requirements change continuously making the traceability of requirements hard and the monitoring of requirements unreliable. Moreover, changing requirements might have an impact on the security properties a system design should satisfy: certain security properties that are satised before evolution might no longer be valid or new security properties need to be satised. This paper presents SeCMER, a tool for requirements evolution management developed in the context of the SecureChange project. The tool supports automatic detection of requirement changes and violation of security properties using change-driven transformations. The tool also supports argumentation analysis to check security properties are preserved by evolution and to identify new security properties that should be taken into account.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Modern software systems are increasingly complex and the environment where they operate is increasingly dynamic. The number and needs of stakeholders is also changing constantly as they need to adjust to the changing environment. A consequence of this trend is that the requirements for a software system increases and changes continually. To deal with evolution, we need analysis techniques that assess the impact of system evolution on the satisfaction of requirements such as security of the system which is very sensitive to evolution: security properties satised before evolution might no longer hold or new security properties need to be satised as result of the evolution.</p><p>Another important aspect is the change management process itself which is a major problem in practice. Changes make the traceability of requirements Work parly supported by the project EU-FP7-ICT-FET-IP-SecureChange.</p><p>hard and the monitoring of requirements unreliable: requirements management is dicult, time-consuming and error-prone when done manually. Thus, a semiautomated requirements evolution management environment, supported by a tool, will improve requirement management with respect to keeping requirements traceability consistent, realizing reliable requirements monitoring, improving the quality of the documentation, and reducing the manual eort.</p><p>In this paper we present SeCMER 4 , a tool developed in the context of the Se- cureChange European project 5 . The tool supports the dierent steps of SeCMER methodology for evolutionary requirements <ref type="bibr" target="#b3">[4]</ref>. The methodology allows to model requirement evolution in dierent state of the art requirement languages such as SI* <ref type="bibr" target="#b5">[6]</ref>, Problem Frames (PF) <ref type="bibr" target="#b8">[9]</ref> and SeCMER that is a requirement language that includes concepts belonging to SI*, PF and security such as asset. The methodology also supports the automatic detection of requirement changes and violation of security properties and argumentation analysis <ref type="bibr" target="#b8">[9]</ref> to check security properties are preserved by evolution and to identify new security properties that should be taken into account. Change driven transformations based on evolution rules <ref type="bibr" target="#b2">[3]</ref> are leveraged to check argument validity, to automatically detect violations or fullment of security properties, and to issue alerts prompting human intervention, a manual analysis or argumentation process, or trigger automated reactions in certain cases.</p><p>In the next section (2) we describe the tool architecture, then we illustrate the tool features based on an industrial example of evolution taken from the air trac management domain (3) and nally conclude the paper (4).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">SeCMER Tool architecture</head><p>SeCMER is an Eclipse-based heterogeneous modeling environment for managing evolving requirements models. It has the following features (See also Fig. <ref type="figure" target="#fig_0">1</ref>):</p><p>Modeling of Evolving Requirements. Requirement models can be drawn in SI*, Problem Frames or SeCMER. Traceability and bidirectional synchronization is supported between SeCMER and SI* requirements models.</p><p>Change detection based on evolution rules. Violations of formally dened static security properties expressed as patterns can be automatically identied. Detection of formal or informal arguments that has been invalidated by changes aecting model elements that contributed to the argument as evidence is also supported.</p><p>Argumentation-based security analysis. Reasoning about security properties satisfaction and identication of new security properties is supported. These capabilities of the tool are provided by means of the integration of a set of EMF-based <ref type="bibr" target="#b6">[7]</ref> Eclipse plug-ins written in Java, relying on standard EMF technologies such as GMF, Xtext and EMF Transaction. 4 A detailed description of the tool implementation is reported in <ref type="bibr" target="#b4">[5]</ref> 5 www.securechange.eu The core trigger engine plug-in oers an Eclipse extension point for dening change-driven rules. Multiple constituent plug-ins contribute extensions to register their respective set of rules. The graph pattern-based declarative event/condition feature of the rules is evaluated eciently (see measurements in <ref type="bibr" target="#b1">[2]</ref>) by the incremental graph pattern matcher plug-ins automatically generated from the declarative description by EMF-IncQuery. At the commit phase of each EMF transaction, the rules that are found to be triggered will be executed to provide their reactions to the preceding changes. These reactions are implemented by arbitrary Java code, and they are allowed to modify the model as well (wrapped in nested transactions) and could therefore be reacted upon.</p><p>So far, there are three groups of change-driven rules as extension points: transformation rules that realize the on-the-y synchronization between multiple modeling formalisms, security-specic evolution rules that detect the appearance of undesired security patterns, raise alerts and optionally oer candidate solutions. rules for invalidating arguments when their ground facts change.</p><p>A major feature is the a bi-directional synchronizing transformation between Si* and the SeCMER model with changes propagated on the y, interactively. Since the languages have dierent expressive power, the following challenges arise:</p><p>1. some concepts are not mapped from one formalism to the other or vice versa, some model elements may be mapped into multiple (even an unbounded amount of ) corresponding model elements in the other formalism, and nally 3. it is possible that a single model element has multiple possible translations (due to the source formalism being more abstract); one of them is created as a default choice, but it can later be changed to the other options, which are also tolerated by the transformation system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Demo Scenario</head><p>We are going to illustrate the features supported by our prototype using the ongoing evolution of ATM systems as planned by the ATM 2000+ Strategic Agenda <ref type="bibr" target="#b0">[1]</ref> and the SESAR Initiative. Part of ATM system's evolution process is the introduction of the Arrival Manager (AMAN), which is an aircraft arrival sequencing tool to help manage and better organize the air trac ow in the approach phase. The introduction of the AMAN requires new operational procedures and functions that are supported by a new information management system for the whole ATM, an IP based data transport network called System Wide Information Management (SWIM) that will replace the current point to point communication systems with a ground/ground data sharing network which connects all the principal actors involved in the Airports Management and the Area Control Centers.</p><p>The entities involved in the simple scenario used for this demo are the AMAN, the Meteo Data Center (MDC), the SWIM-Box and the SWIM-Network. The SWIM-Box is the core of the SWIM information management system which provides access via dened services to data that belong to dierent domain such as ight, surveillance, meteo, etc. The introduction of the SWIM requires suitable security properties to be satised: we will show how to protect information access on meteo data and how to ensure integrity of meteo data.</p><p>1. Requirements evolution. We show how SeCMER supports the representation of the evolution of the requirement model as eect of the introduction of the SWIM. 3. Argumentation-based security analysis. We show how argumentation analysis <ref type="bibr" target="#b8">[9]</ref> can be carried to provide evidence that the information access property applied to the meteo data is satised after evolution. Detecting violations of security properties based on security patterns. SeCMER includes facilities that allow for the declarative denition of security patterns that express situations that leads to the violation of a security property. For example, if a concerned actor wants a security goal that expresses that a resource must be protected, then each actor that the resource is delegated to must be trusted (possibly transitively) by the concerned actor. An exception is made if a trusted actor performs an action to explicitly fulll the security goal, e.g. digital signature makes the trusted path unneccessary in case of an integrity goal. See Lst. 1 for the denition of the pattern using the declarative model query language of EMF-IncQuery <ref type="bibr" target="#b1">[2]</ref>.</p><p>According to this pattern the integrity property for MD is violated because AMAN entrusts MDC with the integrity security goal, but the communitation intermediary actors SWIMBox_MDC, and SWIMBox_AMAN are not.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Automatic corrective actions based on evolution rules. The security pattern in</head><p>Lst. 1 can be used to dene evolution rules that dene automated corrective actions to be applied to the model in order to re-establish the integrity security property. Possibile examples of corrective actions are: Add a trust relationship between MDC and SWIM Network having the integrity security goal as dependum.</p><p>Alternatively, an Action such as MD is digitally signed can be created to protect the integrity of MD even when handled by untrusted actors. The diagram says that the AMAN system is claimed to be secure before the change (Round #1), and the claim is warranted by be the facts the system is known to be a close system (F1), and the physical location of the system is protected (F2). This argument is rebutted in Round #2, in which another argument claims that the system is no longer secure because SWIM will not keep AMAN closed. The rebuttal argument is mitigated in Round #3 by three arguments, which suggest that the AMAN may still be secure given that the physical infrastructure is secure, personnel are trustworthy and access to data is controlled.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusions</head><p>The paper presented SeCMER, a tool for managing evolving requirements. As shown by the ATM-based demo scenario, the tool supports visual modeling of security requirements. Additionally, argument models can be constructed manually to investigate the satisfaction of security properties; the tool detects invalidated arguments if the requirements model evolves. Finally, the tool performs continuous and automatic pattern-based security properties violation detection, with quick x corrective actions specied by evolution rules.</p><p>We are planning to extend the tool in order to support other set of security patterns and evolution rules to automate the detection and handling of security violations in a wider range of application scenarios. We will also realize a tighter integration with additional modeling formalisms (Problem Frames ) and industrial tools e.g DOORS-TREK. The usability and the features of the tool are going to be evaluated through a study involving ATM-domain experts.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Models and features in the SeCMER tool</figDesc><graphic coords="3,134.77,115.83,345.83,222.70" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>2 .</head><label>2</label><figDesc>Change detection based on evolution rules. a Detection of a security property violation based on security patterns. We show how the tool detects that the integrity security property of the resource MD Meteo Data is violated due to the lack of a trusted path. b Automatically providing corrective actions based on evolution rules. We show how evolution rules may suggest corrective actions for the detected violation of the integrity security property.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Annotated screenshot fragments showing requirements evolution</figDesc><graphic coords="5,203.92,115.83,207.53,382.97" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Screenshot fragment showing the argumentation model</figDesc><graphic coords="7,186.64,115.84,242.07,371.94" type="bitmap" /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_0">Pre-proceedings of CAISE'11 Forum</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m">EUROCONTROL ATM Strategy for the Years 2000+ Executive Summary</title>
				<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Incremental evaluation of model queries over EMF models</title>
		<author>
			<persName><forename type="first">G</forename><surname>Bergmann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Model Driven Engineering Languages and Systems, MODELS&apos;10</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<author>
			<persName><forename type="first">G</forename><surname>Bergmann</surname></persName>
		</author>
		<title level="m">Change (in) the Rule to Rule the Change. Software and System Modeling</title>
				<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
	<note>Change-Driven Model Transformations. to appear</note>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<author>
			<persName><surname>Bergmann</surname></persName>
		</author>
		<ptr target="http://www.securechange.eu/sites/default/files/deliverables/D3.2-%20Methodology%20for%20Evolutionary%20Requirements_v3.pdf" />
		<title level="m">D3.2 Methodology for Evolutionary Requirements</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<author>
			<persName><surname>Bergmann</surname></persName>
		</author>
		<ptr target="http://www.securechange.eu/sites/default/files/deliverables/D3.4%20Proof-of-Concept%20CASE%20Tool%20for%20early%20requirements.pdf" />
		<title level="m">D3.4 Proof of Concept Case Tool</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Computer-aided support for secure tropos</title>
		<author>
			<persName><forename type="first">F</forename><surname>Massacci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mylopoulos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Zannone</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Automated Software Engg</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="page">341364</biblScope>
			<date type="published" when="2007-09">September 2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<ptr target="http://www.eclipse.org/emf" />
		<title level="m">The Eclipse Project: Eclipse Modeling Framework</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Early identication of problem interactions: A tool-supported approach</title>
		<author>
			<persName><forename type="first">T</forename><surname>Tun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Requirements Engineering: Foundation for Software Quality, 15th International Working Conference</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">M</forename><surname>Glinz</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Heymans</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page">7488</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Model-based argument analysis for evolving security requirements</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">T</forename><surname>Tun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2010 Fourth International Conference on Secure Software Integration and Reliability Improvement</title>
				<meeting>the 2010 Fourth International Conference on Secure Software Integration and Reliability Improvement<address><addrLine>Washington, DC, USA</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page">8897</biblScope>
		</imprint>
	</monogr>
	<note>SSIRI &apos;10</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
