Modelling Secure Systems Using An Agent Oriented Approach and Security Patterns

Article


Mouratidis, Haralambos, Weiss, Michael and Giorgini, Paolo 2006. Modelling Secure Systems Using An Agent Oriented Approach and Security Patterns. International Journal of Software Engineering and Knowledge Engineering. 16 (3), pp. 471-498.
AuthorsMouratidis, Haralambos, Weiss, Michael and Giorgini, Paolo
Abstract

In this paper we describe an approach for modelling security issues in information systems. It is based on an agent-oriented approach, and extends it with the use of security patterns. Agent-oriented software engineering provides advantages when modeling security issues, since agents are often a natural way of conceptualizing an information system, in particular at the requirements stage, when the viewpoints of multiple stakeholders need to be considered. Our approach uses the Tropos methodology for modelling a system as a set of agents and their social dependencies, with specific extensions for representing security constraints. As an extension to the existing methodology we propose the use of security patterns. These patterns capture proven solutions to common security issues, and support the systematic and structured mapping of these constraints to an architectural model of the system, in particular for non-security specialists.

KeywordsAgent-oriented software engineering; security; Tropos
JournalInternational Journal of Software Engineering and Knowledge Engineering
Journal citation16 (3), pp. 471-498
ISSN0218-1940
Year2006
Accepted author manuscript
License
CC BY-ND
Web address (URL)http://dx.doi.org/10.1142/S0218194006002823
http://hdl.handle.net/10552/416
Publication dates
PrintJun 2006
Publication process dates
Deposited02 Dec 2009
Additional information

Citation:
Mouratidis, H., Weiss, M., Giorgini, P. (2006) ‘Modelling Secure Systems Using An Agent Oriented Approach and Security Patterns’ International Journal of Software Engineering and Knowledge Engineering 16 (3) 471-498.

Permalink -

https://repository.uel.ac.uk/item/8672x

Download files


Accepted author manuscript
  • 88
    total views
  • 235
    total downloads
  • 1
    views this month
  • 5
    downloads this month

Export as