• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Integrated Framework of Security and Privacy Requirements Engineering

Research Project

Project/Area Number 15H02686
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypeSingle-year Grants
Section一般
Research Field Software
Research InstitutionNational Institute of Informatics

Principal Investigator

YOSHIOKA NOBUKAZU  国立情報学研究所, アーキテクチャ科学研究系, 准教授 (20390601)

Co-Investigator(Kenkyū-buntansha) 海谷 治彦  神奈川大学, 理学部, 教授 (30262596)
櫨山 淳雄  東京学芸大学, 教育学部, 教授 (70313278)
鷲崎 弘宜  早稲田大学, 理工学術院, 教授 (70350494)
大久保 隆夫  情報セキュリティ大学院大学, その他の研究科, 教授 (80417518)
Research Collaborator Fernandez Eduardo  
Yu Yijun  
Nuseibeh Bashar  
Project Period (FY) 2015-04-01 – 2019-03-31
Project Status Completed (Fiscal Year 2018)
Budget Amount *help
¥17,940,000 (Direct Cost: ¥13,800,000、Indirect Cost: ¥4,140,000)
Fiscal Year 2018: ¥2,730,000 (Direct Cost: ¥2,100,000、Indirect Cost: ¥630,000)
Fiscal Year 2017: ¥5,590,000 (Direct Cost: ¥4,300,000、Indirect Cost: ¥1,290,000)
Fiscal Year 2016: ¥4,810,000 (Direct Cost: ¥3,700,000、Indirect Cost: ¥1,110,000)
Fiscal Year 2015: ¥4,810,000 (Direct Cost: ¥3,700,000、Indirect Cost: ¥1,110,000)
Keywordsソフトウェア開発効率化・安定化 / ソフトウェア学 / セキュリティ要求 / プライバシー要求 / ソフトウエア開発効率化・安定化 / ソフトウエア学 / セキュア・ネットワーク / ソフトウェアセキュリティ / ソフトウェアプライバシー
Outline of Final Research Achievements

Existing privacy methods which is extension of security method do not mention user needs including individual private feeling. Therefore it is hard to specify appropriate requirements because we cannot make the validation and the reason clear with such methods. We have proposed a method which comes up with privacy requirements with privacy preference from the viewpoint of users' needs. In addition, existing research does not handle the conflicts between privacy and security requirements well. We take the conflicts into account, so that we can develop secure and privacy-friendly service efficiently.

Academic Significance and Societal Importance of the Research Achievements

プライバシーは、近年、社会的に重要視されている国民の権利であり、法律の整備も進んでいる。また、セキュリティは、社会問題になってきており、プライバシーとセキュリティを両方を考慮してサービスを構築することは、社会的に重要な課題である。本研究では、プライバシーとセキュリティとの関係を取り扱っており、その関係を明らかにすることはプライバシーとセキュリティを両方の研究の発展に貢献する。

Report

(5 results)
  • 2018 Annual Research Report   Final Research Report ( PDF )
  • 2017 Annual Research Report
  • 2016 Annual Research Report
  • 2015 Annual Research Report
  • Research Products

    (28 results)

All 2019 2018 2017 2016 2015 Other

All Int'l Joint Research (2 results) Journal Article (21 results) (of which Int'l Joint Research: 8 results,  Peer Reviewed: 19 results,  Open Access: 4 results,  Acknowledgement Compliant: 8 results) Presentation (5 results) (of which Int'l Joint Research: 5 results,  Invited: 1 results)

  • [Int'l Joint Research] Florida Atlantic University(米国)

    • Related Report
      2018 Annual Research Report
  • [Int'l Joint Research] Florida Atrantic University/Computer Science & Engineering(米国)

    • Related Report
      2016 Annual Research Report
  • [Journal Article] Assessing Security and Privacy Behavioural Risks for Self-Protection Systems2019

    • Author(s)
      Yijun Yu, Nobukazu Yoshioka, Tetsuo Tamai
    • Journal Title

      Engineering Adaptive Software Systems 2019

      Volume: 1 Pages: 135-147

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed
  • [Journal Article] 機械学習システムがセキュリティに出会うとき2018

    • Author(s)
      吉岡信和
    • Journal Title

      第1回機械学習工学ワークショップ

      Volume: 1 Pages: 49-53

    • Related Report
      2018 Annual Research Report
  • [Journal Article] Security Requirement Modeling Support System Using Software Security Knowledge Base2018

    • Author(s)
      Atsuo Hazeyama, Shun'ichi Tanaka, Takafumi Tanaka, Hiroaki Hashiura, Seiji Munetoh, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, and Nobukazu Yoshioka
    • Journal Title

      Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)

      Volume: 2 Pages: 234-239

    • DOI

      10.1109/compsac.2018.10235

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Evaluating the degree of security of a system built using security patterns2018

    • Author(s)
      Fernandez Eduardo B.、Yoshioka Nobukazu、Washizaki Hironori
    • Journal Title

      Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018)

      Volume: 1 Pages: 1-8

    • DOI

      10.1145/3230833.3232821

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] 部門ごとの伝票突合せを反映した業務プロセスの信頼性のアセスメント手法2018

    • Author(s)
      河本 高文 , 二木 厚吉 , 吉岡 信和
    • Journal Title

      情報処理学会論文誌

      Volume: 59(9) Pages: 1699-1708

    • NAID

      170000149754

    • Related Report
      2018 Annual Research Report
  • [Journal Article] Taxonomy and Literature Survey of Security Pattern Research2018

    • Author(s)
      Hironori Washizaki, Tian Xia, Natsumi Kamata, Yoshiaki Fukazawa, Hideyuki Kanuka, Dan Yamaoto, Masayuki Yoshino, Takao Okubo, Shinpei Ogata, Haruhiko Kaiya, Takehisa Kato, Atsuo Hazeyama, Takafumi Tanaka, Nobukazu Yoshioka, G Priyalakshmi
    • Journal Title

      IEEE Conference on Applications, Information and Network Security (AINS)

      Volume: 1 Pages: 87-92

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Restructuring Attack Trees to Identify Incorrect or Missing Relationships between Nodes2018

    • Author(s)
      Hua Cai, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka
    • Journal Title

      The International Workshop on Evidence-based Security and Privacy in the Wild 2018 (WESPr-18)

      Volume: 1 Pages: 1-8

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Cloud Security and Privacy Metamodel - Metamodel for Security and Privacy Knowledge in Cloud Services2018

    • Author(s)
      Xia Tian、Washizaki Hironori、Kato Takehisa、Kaiya Haruhiko、Ogata Shinpei、Fernandez Eduardo B.、Kanuka Hideyuki、Yoshino Masayuki、Yamamoto Dan、Okubo Takao、Yoshioka Nobukazu、Hazeyama Atsuo
    • Journal Title

      6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018)

      Volume: 1 Pages: 379-386

    • DOI

      10.5220/0006600403790386

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Preliminary Systematic Literature Review of Software and Systems Traceability2017

    • Author(s)
      Kaiya Haruhiko、Sato Ryohei、Hazeyama Atsuo、Ogata Shinpei、Okubo Takao、Tanaka Takafumi、Yoshioka Nobukazu、Washizaki Hironori
    • Journal Title

      Procedia Computer Science

      Volume: 112 Pages: 1141-1150

    • DOI

      10.1016/j.procs.2017.08.152

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Eliciting Requirements for Improving Users’ Behavior Using Transparency2017

    • Author(s)
      Haruhiko Kaiya, Nobukazu Yoshioka, Hironori Washizaki, Takao Okubo, Atsuo Hazeyama, Shinpei Ogata, Takafumi Tanaka
    • Journal Title

      Requirements Engineering for Internet of Things

      Volume: CCIS 809 Pages: 41-56

    • DOI

      10.1007/978-981-10-7796-8_4

    • ISBN
      9789811077951, 9789811077968
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Goal Modelling for Security Problem Matching and Pattern Enforcement2017

    • Author(s)
      Yu Yijun、Kaiya Haruhiko、Yoshioka Nobukazu、Hu Zhenjiang、Washizaki Hironori、Xiong Yingfei、Hosseinian-Far Amin
    • Journal Title

      International Journal of Secure Software Engineering

      Volume: 8 Issue: 3 Pages: 42-57

    • DOI

      10.4018/ijsse.2017070103

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Security in Cloud Computing and Big Data2016

    • Author(s)
      Eduardo Fernandez, Nobukazu Yoshioka, Hironori Washizaki, Madiha Syed
    • Journal Title

      Journal of Future Internet

      Volume: Vol.8, Issue 2 Issue: 2 Pages: 1-13

    • DOI

      10.3390/fi8020013

    • Related Report
      2016 Annual Research Report 2015 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] Support Implementation of Security Design Patterns Using Test Templates2016

    • Author(s)
      Masatoshi Yoshizawa, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka
    • Journal Title

      Information

      Volume: Vol.7, Number.2 Issue: 2 Pages: 1-19

    • DOI

      10.3390/info7020034

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Open Access / Acknowledgement Compliant
  • [Journal Article] A Metamodel for Security and Privacy Knowledge in Cloud Services2016

    • Author(s)
      Hironori Washizaki, Sota Fukumoto, Misato Yamamoto, Masatoshi Yoshizawa, Yoshiaki Fukazawa, Shinpei Ogata, Eduardo B. Fernandez, Nobukazu Yoshioka, Takehisa Kato, Haruhiko Kaiya, Hideyuki Kanuka, Yuki Kondo, Takao Okubo, Atsuo Hazeyama
    • Journal Title

      Proceedings of 12th IEEE World Congress on Services

      Volume: IEEE SERVICES 2016 Pages: 142-143

    • DOI

      10.1109/services.2016.30

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Requirements Analysis for Privacy Protection and Third Party Awareness Using Logging Models2016

    • Author(s)
      Haruhiko Kaiya, Nobukazu Yoshioka, Takao Okubo, Hironori Washizaki, Atsuo Hazeyama
    • Journal Title

      Proceedings of New Trends in Software Methodologies, Tools and Techniques (SoMeT16)

      Volume: Volume 286 Pages: 155-166

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Literature Survey on Technologies for Developing Privacy-Aware Software2016

    • Author(s)
      Atsuo Hazeyama, Nobukazu Yoshioka, Takao Okubo, Hironori Washizaki, Haruhiko Kaiya
    • Journal Title

      Proceedings of The 3rd International Workshop on The Evolving Security and Privacy Requirements Engineering

      Volume: ESPRE 2016 Pages: 86-91

    • DOI

      10.1109/rew.2016.029

    • NAID

      130008080131

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] TESEM: A Tool for Verifying Security Design Pattern Applications by Model Testing2015

    • Author(s)
      Takanori Kobashi, Masatoshi Yoshizawa, Hironori Washizaki, Yoshiaki Fukazawa, Nobukazu Yoshioka, Haruhiko Kaiya, Takano Okubo
    • Journal Title

      Proceedings of the 8th IEEE International Conference on Software Testing, Verification, and Validation

      Volume: ICST 2015 Pages: 1-8

    • DOI

      10.1109/icst.2015.7102633

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Case Base for Secure Software Development Using Software Security Knowledge Base2015

    • Author(s)
      Atsuo Hazeyama, Masahito Saito, Nobukazu Yoshioka, Azusa Kumagai, Takanori Kobashi, Hironori Washizaki, Haruhiko Kaiya, and Takao Okubo
    • Journal Title

      Proceedings of the 39th Annual International Computers, Software & Applications Conference (COMPSAC2015)

      Volume: 3 Pages: 97-103

    • DOI

      10.1109/compsac.2015.86

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] A Case-based Management System for Secure Software Development Using Software Security Knowledge,2015

    • Author(s)
      Masahito Saito, Atsuo Hazeyama, Nobukazu Yoshioka, Takanori Kobashi, Hironori Washizaki, Haruhiko Kaiya, and Takao Okubo
    • Journal Title

      Procedia Computer Science: Proceedings of the 19th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems (KES2015)

      Volume: 60 Pages: 1092-1100

    • DOI

      10.1016/j.procs.2015.08.155

    • NAID

      110010021521

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Open Access / Acknowledgement Compliant
  • [Journal Article] Patterns for security and privacy in cloud ecosystems2015

    • Author(s)
      Eduardo B. Fernandez, Nobukazu Yoshioka and Hironori Washizaki
    • Journal Title

      The 2nd International Workshop on The Evolving Security and Privacy Requirements Engineering

      Volume: ESPRE 2015 Pages: 13-18

    • DOI

      10.1109/espre.2015.7330162

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Method Using Command Abstraction Library for Iterative Testing Security of Web Application2015

    • Author(s)
      Seiji Muneto, Noukazu Yoshioka
    • Journal Title

      International Journal of Secure Software Engineering

      Volume: Vol.6, No.3 Issue: 3 Pages: 26-49

    • DOI

      10.4018/ijsse.2015070102

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Presentation] Current and Future challenge of Model and Modeling on Security and Privacy2016

    • Author(s)
      Nobukazu Yoshioka
    • Organizer
      The 1st International Workshop for Models and Modelling on Security and Privacy
    • Place of Presentation
      Gifu, Japan
    • Year and Date
      2016-11-14
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] Pattern varieties and their uses in building systems2016

    • Author(s)
      Eduardo B. Fernandez, Nobukazu Yoshioka and Hironori Washizaki
    • Organizer
      The Third International Workshop on Patterns Promotion and Anti-patterns Prevention
    • Place of Presentation
      大阪大学、大阪府吹田市
    • Year and Date
      2016-03-15
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] A Metamodel for Security and Privacy Knowledge in Cloud Services2016

    • Author(s)
      Hironori Washizaki, Sota Fukumoto, Misato Yamamoto, Masatoshi Yoshizawa, Yoshiaki Fukazawa, Takehisa Kato, Takao Okubo, Hideyuki Kanuka, Yuki Kondo, Shinpei Ogata, Atsuo Hazeyama, Haruhiko Kaiya and Eduardo B. Fernandez
    • Organizer
      The Third International Workshop on Patterns Promotion and Anti-patterns Prevention
    • Place of Presentation
      大阪大学、大阪府吹田市
    • Year and Date
      2016-03-15
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Systematic Mapping of Security Patterns Research2015

    • Author(s)
      Yurina Ito, Hironori Washizaki, Masatoshi Yoshizawa, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Atsuo Hazeyama, Nobukazu Yoshioka, Eduardo B. Fernandez
    • Organizer
      the 22nd Conference on Pattern Languages of Programs Conference 2015
    • Place of Presentation
      Pennsylvania, USA
    • Year and Date
      2015-10-24
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Finding Potential Threats in Several Security Targets for Eliciting Security Requirements2015

    • Author(s)
      Haruhiko Kaiya, Shinpei Ogata, Shinpei Hayashi, Motoshi Saeki, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki, Atsuo Hazeyama
    • Organizer
      10th International Multi-Conference on Computing in the Global Information Technology (ICCGI 2015)
    • Place of Presentation
      Malta
    • Year and Date
      2015-10-14
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research

URL: 

Published: 2015-04-16   Modified: 2022-08-22  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi