Secure software systems engineering: The secure Tropos approach

被引:19
作者
Mouratidis H. [1 ]
机构
[1] School of Computing, IT and Engineering, University of East London
关键词
Ecure tropos; Secure design; Secure software systems engineering; Security requirements;
D O I
10.4304/jsw.6.3.331-339
中图分类号
学科分类号
摘要
This paper discusses the secure Tropos methodology. This is the first paper in the literature that discusses all the aspects of the methodology as it has evolved over the last 10 years. In particular, the paper discusses the Secure Tropos modeling language, the security aware process of the methodology, and it also introduces the secTro, an automated tool to support the methodology. © 2011 Academy Publisher.
引用
收藏
页码:331 / 339
页数:8
相关论文
共 19 条
[1]  
Anton A.I., Earp J.B., A requirements taxonomy for reducing web site privacy vulnerabilities, Requirements Engineering, 9, 3, pp. 169-185, (2004)
[2]  
Schumacher M., Roedig U., Security Engineering with Patterns, In the Proceedings of the 8th Conference On Pattern Languages for Programs, (2001)
[3]  
van Lamsweerde A., Letier E., Handling obstacles in goal-oriented requirements engineering, Transactions of Software Engineering, 26, 10, pp. 978-1005, (2000)
[4]  
Crook R., Ince D., Lin L., Nuseibeh B., Security requirements engineering: When anti-requirements hit the fan, International Requirements Engineering Conference, pp. 203-205, (2002)
[5]  
Lin L.C., Nuseibeh B., Ince D., Jackson M., Moffett J., Analysing security threats and vulnerabilities using abuse frames, Technical Report 2003/10, (2003)
[6]  
Liu L., Yu E., Mylopoulos J., Security and privacy requirements analysis within a social setting, Proceedings of the 11th International Requirements Engineering Conference, pp. 151-161, (2003)
[7]  
McDermott J., Fox C., Using abuse care models for security requirements analysis, Proceedings of the 15th Annual Computer Security Applications Conference, (1999)
[8]  
Sindre G., Opdahl A.L., Eliciting security requirements with misuse cases, Requirements Engineering, 10, 1, pp. 34-44, (2005)
[9]  
Jurjens J., Secure Systems Development with UML, (2004)
[10]  
Lodderstedt T., Basin D., Doser J., SecureUML: A UML- Based Modelling Language for Model-Driven Security, Proceedings of the UML'02, LNCS 2460, pp. 426-441, (2002)