Skip to Main content Skip to Navigation
Conference papers

Eliciting Security Requirements for Business Processes of Legacy Systems

Abstract : The modernisation of enterprise legacy systems, without compromises in their functionality, is a demanding and time consuming endeavour. To retain the underlying business behaviour during their modernisation, the MARBLETM framework has been developed for the extraction of business process models from their source code. Building on top of that work, in this paper we propose an integrated approach for transforming the extracted legacy process models into Secure Tropos goal models. Such models facilitate the elicitation of security requirements in a high level of abstraction, which are then incorporated back into the process models of the modernised systems as security features. Therefore high level models can be derived from legacy source code with minimal manual intervention, where security can be elaborated by nontechnical stakeholders in alignment with organisational objectives.
Complete list of metadata

https://hal.inria.fr/hal-01442267
Contributor : Hal Ifip <>
Submitted on : Friday, January 20, 2017 - 3:07:36 PM
Last modification on : Saturday, January 21, 2017 - 1:04:34 AM
Long-term archiving on: : Friday, April 21, 2017 - 3:31:41 PM

File

978-3-319-25897-3_7_Chapter.pd...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Nikolaos Argyropoulos, Luis Alcañiz, Haralambos Mouratidis, Andrew Fish, David Rosado, et al.. Eliciting Security Requirements for Business Processes of Legacy Systems. 8th Practice of Enterprise Modelling (P0EM), Nov 2015, Valencia, Spain. pp.91-107, ⟨10.1007/978-3-319-25897-3_7⟩. ⟨hal-01442267⟩

Share

Metrics

Record views

202

Files downloads

457