A CASE tool to support automated modelling and analysis of security requirements, based on secure tropos

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

    Abstract

    Secure Tropos, an extension of the Tropos methodology, considers security requirements alongside functional requirements, from the early stages of the system development process.The Secure Tropos language uses security concepts such as security constraint, secure goal, secure plan, secure resource, and threat to capture the security concepts from both social and organisational settings. These concepts are used to model and reason about security for a specific system context. This paper presents a CASE tool, called SecTro, which supports automated modelling and analysis of security requirements based on Secure Tropos. The tool's architecture, layout, and functionalities are demonstrated through a real world example using the Secure Tropos concepts.

    Original languageEnglish
    Title of host publicationIS Olympics
    Subtitle of host publicationInformation Systems in a Diverse World - CAiSE Forum 2011, Selected Extended Papers
    PublisherSpringer-Verlag
    Pages95-109
    Number of pages15
    ISBN (Print)9783642297489
    DOIs
    Publication statusPublished - 1 Jan 2012
    EventCAiSE Forum 2011 on IS Olympics: Information Systems in a Diverse World - London, United Kingdom
    Duration: 20 Jun 201124 Jun 2011

    Publication series

    NameLecture Notes in Business Information Processing
    Volume107 LNBIP
    ISSN (Print)1865-1348

    Conference

    ConferenceCAiSE Forum 2011 on IS Olympics: Information Systems in a Diverse World
    Country/TerritoryUnited Kingdom
    CityLondon
    Period20/06/1124/06/11

    Keywords

    • CASE tools
    • Goal Modelling
    • Requirements Engineering
    • SecTro
    • Secure Tropos
    • Security

    Fingerprint

    Dive into the research topics of 'A CASE tool to support automated modelling and analysis of security requirements, based on secure tropos'. Together they form a unique fingerprint.

    Cite this