A CASE tool to support automated modelling and analysis of security requirements
Book chapter
Pavlidis, M., Islam, S. and Mouratidis, H. 2012. A CASE tool to support automated modelling and analysis of security requirements. in: Nurcan, S. (ed.) IS Olympics: Information Systems in a Diverse World Springer. pp. 95-109
Authors | Pavlidis, M., Islam, S. and Mouratidis, H. |
---|---|
Editors | Nurcan, S. |
Abstract | Secure Tropos, an extension of the Tropos methodology, considers security requirements alongside functional requirements, from the early stages of the system development process. The Secure Tropos language uses security concepts such as security constraint, secure goal, secure plan, secure resource, and threat to capture the security concepts from both social and organisational settings. These concepts are used to model and reason about security for a specific system context. This paper presents a CASE tool, called SecTro, which supports automated modelling and analysis of security requirements based on Secure Tropos. The tool’s architecture, layout, and functionalities are demonstrated through a real world example using the Secure Tropos concepts. |
Keywords | security; goal modelling |
Book title | IS Olympics: Information Systems in a Diverse World |
Page range | 95-109 |
Year | 2012 |
Publisher | Springer |
Publication dates | |
13 Apr 2012 | |
Publication process dates | |
Deposited | 04 May 2012 |
Series | Lecture Notes in Business Information Processing |
ISBN | 978-3-642-29749-6 |
978-3-642-29748-9 | |
ISSN | 1865-1348 |
Digital Object Identifier (DOI) | https://doi.org/10.1007/978-3-642-29749-6 |
Web address (URL) | https://link.springer.com/book/10.1007/978-3-642-29749-6 |
Additional information | Citation: |
Journal | Lecture Notes in Business Information Processing |
Accepted author manuscript | License CC BY-ND File Access Level Anyone |
https://repository.uel.ac.uk/item/85zz4
Download files
217
total views143
total downloads12
views this month4
downloads this month