Analysing Security Requirements of Information Systems using Tropos

Conference paper


Mouratidis, Haralambos 2006. Analysing Security Requirements of Information Systems using Tropos. Proceedings 1st Annual Conference on Advances in Computing and Technology (AC&T). London - United Kingdom pp. 55 – 64
AuthorsMouratidis, Haralambos
TypeConference paper
Abstract

Security is an important issue when developing complex information systems, however very little work has been done in integrating security concerns during the analysis of information systems. Current methodologies fail to adequately integrate security and systems engineering, basically because they lack concepts and models as well as a systematic approach towards security. We believe that security should be considered during the whole development process and it should be defined together with the requirements specification.
This paper introduces extensions to the Tropos methodology to accommodate security. A
description of new concepts is given along with an explanation of how these concepts are
integrated to the current stages of Tropos. The above is illustrated using an agent-based
health and social care information system as a case study.

Keywordssoftware engineering methodologies; secure information systems; computer security patterns
Year2006
ConferenceProceedings 1st Annual Conference on Advances in Computing and Technology (AC&T)
Accepted author manuscript
License
CC BY-ND
Publication dates
PrintJan 2006
Publication process dates
Deposited30 Nov 2009
Web address (URL)http://hdl.handle.net/10552/409
Additional information

Citation:
Mouratidis, H. (2006) ‘Analysing Security Requirements of Information Systems using Tropos’ Proceedings 1st Annual Conference on Advances in Computing and Technology (AC&T), London - United Kingdom, pp. 55 – 64.

Place of publicationpp. 55 – 64
Permalink -

https://repository.uel.ac.uk/item/8674v

  • 0
    total views
  • 0
    total downloads
  • 0
    views this month
  • 0
    downloads this month