A CASE tool to support automated modelling and analysis of security requirements, based on secure tropos

Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBN

Abstract

Secure Tropos, an extension of the Tropos methodology, considers security requirements alongside functional requirements, from the early stages of the system development process.The Secure Tropos language uses security concepts such as security constraint, secure goal, secure plan, secure resource, and threat to capture the security concepts from both social and organisational settings. These concepts are used to model and reason about security for a specific system context. This paper presents a CASE tool, called SecTro, which supports automated modelling and analysis of security requirements based on Secure Tropos. The tool's architecture, layout, and functionalities are demonstrated through a real world example using the Secure Tropos concepts.

Original languageEnglish
Title of host publicationIS Olympics
Subtitle of host publicationInformation Systems in a Diverse World - CAiSE Forum 2011, Selected Extended Papers
PublisherSpringer-Verlag
Pages95-109
Number of pages15
ISBN (Print)9783642297489
DOIs
Publication statusPublished - 1 Jan 2012
EventCAiSE Forum 2011 on IS Olympics: Information Systems in a Diverse World - London, United Kingdom
Duration: 20 Jun 201124 Jun 2011

Publication series

NameLecture Notes in Business Information Processing
Volume107 LNBIP
ISSN (Print)1865-1348

Conference

ConferenceCAiSE Forum 2011 on IS Olympics: Information Systems in a Diverse World
CountryUnited Kingdom
CityLondon
Period20/06/1124/06/11

Keywords

  • CASE tools
  • Goal Modelling
  • Requirements Engineering
  • SecTro
  • Secure Tropos
  • Security

Fingerprint Dive into the research topics of 'A CASE tool to support automated modelling and analysis of security requirements, based on secure tropos'. Together they form a unique fingerprint.

  • Cite this

    Pavlidis, M., Islam, S., & Mouratidis, H. (2012). A CASE tool to support automated modelling and analysis of security requirements, based on secure tropos. In IS Olympics: Information Systems in a Diverse World - CAiSE Forum 2011, Selected Extended Papers (pp. 95-109). (Lecture Notes in Business Information Processing; Vol. 107 LNBIP). Springer-Verlag. https://doi.org/10.1007/978-3-642-29749-6_7