Pattern-Based Security Requirements Derivation from Secure Tropos Models - The Practice of Enterprise Modeling Access content directly
Conference Papers Year : 2015

Pattern-Based Security Requirements Derivation from Secure Tropos Models

Atilio Rrenja
  • Function : Author
  • PersonId : 998936
Raimundas Matulevičius
  • Function : Author
  • PersonId : 998924

Abstract

The increasing rates of cyber-attacks have led to the subsequent need to rapidly develop secure information systems (IS). Secure Tropos is an actor and goal-oriented approach to identify security goals and to enable security requirements elicitation. This is achieved by considering system actors, their dependencies and by deriving security constraints that actors need to satisfy. Nevertheless goal-oriented modelling has proven itself to be valid it also contains few shortcomings. One of them is the high granularity of the process, which leads quickly to high complexity models. Security patterns are proven to be reusable solutions that address recurring security problems. In this paper we investigate the integration of a pattern-based security requirements derivation from the Secure Tropos models.
Fichier principal
Vignette du fichier
978-3-319-25897-3_5_Chapter.pdf (1.5 Mo) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-01442266 , version 1 (20-01-2017)

Licence

Attribution

Identifiers

Cite

Atilio Rrenja, Raimundas Matulevičius. Pattern-Based Security Requirements Derivation from Secure Tropos Models. 8th Practice of Enterprise Modelling (P0EM), Nov 2015, Valencia, Spain. pp.59-74, ⟨10.1007/978-3-319-25897-3_5⟩. ⟨hal-01442266⟩
193 View
177 Download

Altmetric

Share

Gmail Facebook X LinkedIn More