Skip to Main content Skip to Navigation
Conference papers

Pattern-Based Security Requirements Derivation from Secure Tropos Models

Abstract : The increasing rates of cyber-attacks have led to the subsequent need to rapidly develop secure information systems (IS). Secure Tropos is an actor and goal-oriented approach to identify security goals and to enable security requirements elicitation. This is achieved by considering system actors, their dependencies and by deriving security constraints that actors need to satisfy. Nevertheless goal-oriented modelling has proven itself to be valid it also contains few shortcomings. One of them is the high granularity of the process, which leads quickly to high complexity models. Security patterns are proven to be reusable solutions that address recurring security problems. In this paper we investigate the integration of a pattern-based security requirements derivation from the Secure Tropos models.
Complete list of metadata

https://hal.inria.fr/hal-01442266
Contributor : Hal Ifip <>
Submitted on : Friday, January 20, 2017 - 3:07:33 PM
Last modification on : Saturday, January 21, 2017 - 1:04:34 AM
Long-term archiving on: : Friday, April 21, 2017 - 3:30:42 PM

File

978-3-319-25897-3_5_Chapter.pd...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Atilio Rrenja, Raimundas Matulevičius. Pattern-Based Security Requirements Derivation from Secure Tropos Models. 8th Practice of Enterprise Modelling (P0EM), Nov 2015, Valencia, Spain. pp.59-74, ⟨10.1007/978-3-319-25897-3_5⟩. ⟨hal-01442266⟩

Share

Metrics

Record views

509

Files downloads

422