2008
DOI: 10.1007/978-3-540-69534-9_40
|View full text |Cite
|
Sign up to set email alerts
|

Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development

Abstract: Abstract. Security is a major target for todays information systems (IS) designers. Security modelling languages exist to reasoning on security in the early phases of IS development, when the most crucial design decisions are made. Reasoning on security involves analysing risk, and effectively communicating risk-related information. However, we think that current languages can be improved in this respect. In this paper, we discuss this issue for Secure Tropos, the language supporting the eponymous agent-based … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
42
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 63 publications
(46 citation statements)
references
References 19 publications
0
42
0
Order By: Relevance
“…Matulevicius et al [20] treat vulnerabilities as beliefs in the knowledge base of attackers which may contribute to the success of an attack. In [22], the i* framework is extended to represent vulnerabilities and their relation with threats and other elements of the i* models.…”
Section: Modeling Vulnerabilities For Security Requirements Engineeringmentioning
confidence: 99%
See 2 more Smart Citations
“…Matulevicius et al [20] treat vulnerabilities as beliefs in the knowledge base of attackers which may contribute to the success of an attack. In [22], the i* framework is extended to represent vulnerabilities and their relation with threats and other elements of the i* models.…”
Section: Modeling Vulnerabilities For Security Requirements Engineeringmentioning
confidence: 99%
“…Among them, CORAS [7] does not investigate which design choices, requirements, or processes have brought the vulnerabilities to the system, and the semantics of relationships among vulnerabilities, and between vulnerabilities and threats are not defined. Similar to CORAS, the resulting models in [20,22] do not specify how, by what actions and actors the vulnerability is brought to the system. These models do not capture the impact of countermeasures on the vulnerabilities and attacks.…”
Section: Modeling Vulnerabilities For Security Requirements Engineeringmentioning
confidence: 99%
See 1 more Smart Citation
“…Only few security software engineering approaches consider analyzing vulnerabilities, as weaknesses in the systems, during the elicitation of security requirements. For instance, in [27], vulnerabilities are modeled as beliefs inside the boundary of attackers that may positively contribute to attacks. However, the resulting models do not specify which actions or assets introduce vulnerabilities into the system, and which actors are vulnerable.…”
Section: Introductionmentioning
confidence: 99%
“…The CORAS framework [5,12] provides a way for expressing how a vulnerability leads to another vulnerability and how a vulnerability (or combination of vulnerabilities) lead to a threat. However, similar to [27], CORAS does not investigate which design choice, requirement, or process has brought the vulnerabilities to the system. Current state of the art raises the need for a systematic way to link the empirical security knowledge such as information about vulnerabilities, attacks, and proper countermeasure to stakeholders' goals and security requirements.…”
Section: Introductionmentioning
confidence: 99%