Nane: Identifying Misuse Cases Using Temporal Norm Enactments
Title | Nane: Identifying Misuse Cases Using Temporal Norm Enactments |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Ozgur Kafali, Munindar P. Singh, Laurie Williams |
Conference Name | 24th IEEE International Requirements Engineering Conference |
Date Published | To Appear |
Conference Location | Beijing, China |
Keywords | digital forensics, security requirements, temporal reasoning |
Abstract | Recent data breaches in domains such as healthcare, where confidentiality of data is crucial, indicate that misuse cases often originate from user errors rather than vulnerabilities in the technical (software or hardware) architecture. Current requirements engineering (RE) approaches determine what access control mechanisms are needed to protect sensitive resources. However, current RE approaches inadequately characterize how a user is expected to interact with others in relation to the relevant resources. Consequently, a requirements analyst cannot readily identify the vulnerabilities based on user interactions. We adopt social norms as a natural, formal means of characterizing user interactions wherein potential misuses map to norm violations. Our research goal is to help analysts identify misuse cases by systematically generating potential temporal enactments that violate formally stated social norms. We propose Nane: a formal framework for identifying misuse cases from norm enactments. We represent misuse cases formally, and propose a semiautomated process for identifying misuse cases based on norm enactments. We show that our process is sound and complete with respect to the stated norms. We discuss the expressiveness of our representation, and demonstrate how Nane enables monitoring of misuse cases via temporal reasoning. |
Citation Key | RE-16:Nane |
Refereed Designation | Refereed |