A CASE tool to support automated modelling and analysis of security requirements
Pavlidis, Michalis, Islam, S. and Mouratidis, Haralambos 2012. A CASE tool to support automated modelling and analysis of security requirements. in: IS Olympics: Information Systems in a Diverse World Springer.
|Authors||Pavlidis, Michalis, Islam, S. and Mouratidis, Haralambos|
Secure Tropos, an extension of the Tropos methodology, considers security requirements alongside functional requirements, from the early stages of the system development process. The Secure Tropos language uses security concepts such as security constraint, secure goal, secure plan, secure resource, and threat to capture the security concepts from both social and organisational settings. These concepts are used to model and reason about security for a specific system context. This paper presents a CASE tool, called SecTro, which supports automated modelling and analysis of security requirements based on Secure Tropos. The tool’s architecture, layout, and functionalities are demonstrated through a real world example using the Secure Tropos concepts.
|Keywords||security; goal modelling|
|Book title||IS Olympics: Information Systems in a Diverse World|
|Publication process dates|
|Deposited||04 May 2012|
|Series||Lecture Notes in Business Information Processing|
|Web address (URL)||http://hdl.handle.net/10552/1578|
|Journal||Lecture Notes in Business Information Processing|
|Accepted author manuscript|
1views this month
0downloads this month