Skip to Main content Skip to Navigation
Conference papers

Pattern-Based Security Requirements Derivation from Secure Tropos Models

Abstract : The increasing rates of cyber-attacks have led to the subsequent need to rapidly develop secure information systems (IS). Secure Tropos is an actor and goal-oriented approach to identify security goals and to enable security requirements elicitation. This is achieved by considering system actors, their dependencies and by deriving security constraints that actors need to satisfy. Nevertheless goal-oriented modelling has proven itself to be valid it also contains few shortcomings. One of them is the high granularity of the process, which leads quickly to high complexity models. Security patterns are proven to be reusable solutions that address recurring security problems. In this paper we investigate the integration of a pattern-based security requirements derivation from the Secure Tropos models.
Complete list of metadata
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Friday, January 20, 2017 - 3:07:33 PM
Last modification on : Saturday, January 21, 2017 - 1:04:34 AM
Long-term archiving on: : Friday, April 21, 2017 - 3:30:42 PM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Atilio Rrenja, Raimundas Matulevičius. Pattern-Based Security Requirements Derivation from Secure Tropos Models. 8th Practice of Enterprise Modelling (P0EM), Nov 2015, Valencia, Spain. pp.59-74, ⟨10.1007/978-3-319-25897-3_5⟩. ⟨hal-01442266⟩



Record views


Files downloads