Security Requirements Engineering for Cloud Computing: The Secure Tropos Approach

Haralambos Mouratidis, Nikolaos Argyropoulos, Shaun Shei

Research output: Chapter in Book/Conference proceeding with ISSN or ISBNChapter

Abstract

Security is considered as an important aspect of software systems, especially in the context of cloud computing. Nevertheless current practises towards securing software systems fail to take into account security issues during the early development stages and also cannot properly address the unique characteristics and needs of the cloud environment. To address such issues, Secure Tropos has been developed as a securityoriented requirements engineering approach, o ering a modelling language and sets of diagrams which facilitate the elicitation and elaboration of security features for software systems. In this work we introduce Secure Tropos by discussing its main concepts, their relations and the main diagrams used to capture the di erent aspects of a software system. SecTro, a CASE tool developed speci cally for the creation and analysis of Secure Tropos diagrams, is used to model a case study as an illustrative example. Finally, future work on expanding the functionalities o ered by Secure Tropos are discussed.
Original languageEnglish
Title of host publicationDomain-Specific Conceptual Modeling: Concepts, Methods and Tools
EditorsD. Karagiannis, H.C. Mayr, J. Mylopoulos
Place of PublicationSwitzerland
PublisherSpringer International Publishing
Pages357-380
Number of pages24
ISBN (Print)9783319394169
DOIs
Publication statusPublished - 10 Jul 2016

Keywords

  • Information Security
  • Cloud computing
  • Security requirements engineering
  • Security modeling
  • Secure Tropos

Fingerprint

Dive into the research topics of 'Security Requirements Engineering for Cloud Computing: The Secure Tropos Approach'. Together they form a unique fingerprint.

Cite this