2006
DOI: 10.1007/11767138_5
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Comprehensive Framework for Secure Systems Development

Abstract: Abstract. Security is a two dimensional problem that involves technical as well as social challenges. In the development of security-critical applications, system developers must consider both the technical and the social parts. To achieve this, security issues must be considered during the whole development life-cycle of an information system. This paper presents an approach that allows developers to consider both the social and the technical dimensions of security through a structured and well defined proces… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0

Year Published

2009
2009
2014
2014

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 38 publications
(37 citation statements)
references
References 16 publications
0
34
0
Order By: Relevance
“…There are works that define a transition between development stages, for example, a correspondence between KAOS and SecureUML is proposed in [23] to define security policies related of access control. And, in [24] a mapping between Secure Tropos and UMLsec is proposed.…”
Section: ) Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…There are works that define a transition between development stages, for example, a correspondence between KAOS and SecureUML is proposed in [23] to define security policies related of access control. And, in [24] a mapping between Secure Tropos and UMLsec is proposed.…”
Section: ) Comparisonmentioning
confidence: 99%
“…So it is necessary to combine SRE methodologies with RA methodologies. Several works have already been proposed this: KAOS [25], Secure Tropos [24] [27], CORAS [15] [28].…”
Section: Introductionmentioning
confidence: 99%
“…Also relevant is URN [24], an i* variation which has been added as part of the industrial Telecommunications Standard Z.151 [25] for systems specification. Besides these three main proposals, namely seminal i*, Tropos and GRL [26], there are also others that have introduced several constructs in the language with different research aims, such as security and trust concerns [12,18], temporal operators [27] and traceability constructs [28], among others. In spite of the different aims of the proposals using the i* framework, it is possible to classify the i* extensions or modifications with respect to the constructs they customize (see Table 1).…”
Section: The I* Framework and Its Variationsmentioning
confidence: 99%
“…A more indepth discussion may be found at [9]. We have identified only one proposal [28,29] which generates a different language structure because it adds softgoals to describe dependency's security properties. However, even this proposal is built upon the same conceptual framework.…”
Section: The I* Framework and Its Variationsmentioning
confidence: 99%
“…For example, in [27] Mouratidis et.al. merge the high-level concepts and modelling activities of the secure Tropos methodology with UMLsec models.…”
Section: Secure Software Engineering and Modelling Languagesmentioning
confidence: 99%