390 research outputs found

    Selecting Security Mechanisms in Secure Tropos

    Get PDF

    Applying tropos to socio-technical system design and runtime configuration

    Get PDF
    Recent trends in Software Engineering have introduced the importance of reconsidering the traditional idea of software design as a socio-tecnical problem, where human agents are integral part of the system along with hardware and software components. Design and runtime support for Socio-Technical Systems (STSs) requires appropriate modeling techniques and non-traditional infrastructures. Agent-oriented software methodologies are natural solutions to the development of STSs, both humans and technical components are conceptualized and analyzed as part of the same system. In this paper, we illustrate a number of Tropos features that we believe fundamental to support the development and runtime reconïŹguration of STSs. Particularly, we focus on two critical design issues: risk analysis and location variability. We show how they are integrated and used into a planning-based approach to support the designer in evaluating and choosing the best design alternative. Finally, we present a generic framework to develop self-reconïŹgurable STSs

    A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements

    Get PDF
    Cloud computing provides a wide range of services to organisations in a flexible and cost efficient manner. Nevertheless, inherent cloud security issues make organisations hesitant towards the migration of their services to cloud. In parallel, the cloud service-oriented nature requires a specific and more demanding description of the business functional requirements intended for migration. Organisations need to transform their functional requirements based on a specific language, taking into account the respective non-functional requirements of the migrating services. Thus, the need for an approach that will holistically capture organisations\u27 security and privacy requirements and transform them to cloud service requirements is immense. To this end, this paper presents an approach that takes as input abstract security and privacy requirements and produces through a semi-automatic process various alternative implementation options for cloud services. To achieve that a series of model transformations are utilised in order to create a mapping between the organisational and the operational level of the system\u27s analysis

    Evaluation Framework for Software Security Requirements Engineering Tools

    Get PDF
    Tarkvaraarenduses on nĂ”uded kui sĂŒsteemi vundament, mis vastutavad ka ebaĂ”nnestumiste eest. Valed nĂ”uded vĂ”ivad viia tarkvara eripĂ€radeni, mis tegelikult ei vasta spetsifikatsioonidele. Sel pĂ”hjusel peetakse nĂ”uete koostamist kĂ”ige keerulisemaks ja olulisemaks sammuks tarkvaraarenduse elutsĂŒkli kĂ”ikide protsesside jooksul. TĂ€napĂ€eval, kus kĂŒberrĂŒnnakud on \n\rtavalised, mĂ€ngivad turvalisuse nĂ”uded vĂ€ga olulist rolli tarkvaraarenduse protsessis. On levimas uut tĂŒĂŒpi tööriistad, mille kasutamist peetakse kĂ”ige efektiivsemaks meetodiks turvalisusnĂ”uete vĂ€ljatöötamisel. Lisaks vĂ”imaldavad need tööriistad lahendada turvalisusega seotud kĂŒsimusi kasutajal endal, hoides mĂ€rgatavalt kokku inseneride aega. Siiski on nende tööriistade \n\rareng alles algstaadiumis ning neid ei ole tarkvarainseneride poolt massiliselt kasutusele vĂ”etud. PĂ”hjus on vĂ€ga pikas uue tarkvara Ă”ppimise ja sellega kohanemise protsessis, mis pĂ”hjustab ajakadu arendusprotsessis ning lisab projektile kulusid. Projekti jaoks konkreetse tööriista valimisel vĂ”ib tutvumine ja katsetamine vĂ”tta inseneridel hulgaliselt aega. Lisaks sellele vĂ”ib struktureerimata valikuprotsess viia vale tööriista kasutuselevĂ”tmisele, mis raiskab omakorda kĂ”igi aega ja pingutusi. Selles uurimuses kavatseme me koostada struktureeritud lĂ€henemise, mis aitab insenere turvaliste tööriistade valimisel. Protsessile kaasaaitamiseks saavad analĂŒĂŒtikud ja arhitektid hinnata tarkvara omadusi, mida nad enda seisukohast olulisimateks peavad. Sellest lĂ€htuvalt saavad nad valida kindlate tööriistade vahel ning teha parima valiku. \n\rAntud uurimustöös konstrueeritud lĂ€henemisega on vĂ”imalik sÀÀsta aega, vaeva ja kulutusi. Uurimuse koostamise kĂ€igus uurime me tarkvaraarenduse turvaprotsesse, meetodeid ja tööriistu ning pĂŒĂŒame luua raamistikku, mis oleks inseneridele turvalisusnĂ”uete tööriistade hindamisel abiks.In software development requirements are considered as building blocks of software system, which also are considered to be responsible in event of failure. Bad requirements can lead to software features that are not to the specifications. For that reason requirement gathering process is considered as the most sensitive and complicated process among all software engineering lifecycle processes. In current age where cyber-attacks are common security requirements also comes into place and plays a very important role in software development process. In order to elicit security requirements new type of tools are begin to form a shape called security engineering tools which help in eliciting security requirements. That considered being the most efficient way of eliciting security requirements. Moreover these tools empower users with artifacts specifically to cater security needs, which save time and efforts for engineers in return. Nevertheless these tools are still at their infantry and are lacking mass adoption by software security engineers. Reason because these tools have steep learning curve which can add-up to development time and end up pushing more cost to the project. In order to decide which tool to select for a particular project require engineers to use these tools which in return will consume tremendous amount of time. Moreover using unstructured tool selection process can also leads to wrong tool selection which will be the waste of time and efforts. In this research work we are going to construct structured approach which will help engineers in security engineering tool selection process. In order to aid this process analysts and architects will be able to rate the features they want the most in a particular security engineering tool. In return from this process they will be able to choose between security engineering tools and select the best one. Finally using approach constructed in this research work will save time, efforts, and costs. In our approach we will analyze security engineering processes, methods and tools, to construct a framework that will help aid engineers in security engineering tool evaluation process
    • 

    corecore