Secure software systems engineering: The secure Tropos approach

被引:19
|
作者
Mouratidis H. [1 ]
机构
[1] School of Computing, IT and Engineering, University of East London
关键词
Ecure tropos; Secure design; Secure software systems engineering; Security requirements;
D O I
10.4304/jsw.6.3.331-339
中图分类号
学科分类号
摘要
This paper discusses the secure Tropos methodology. This is the first paper in the literature that discusses all the aspects of the methodology as it has evolved over the last 10 years. In particular, the paper discusses the Secure Tropos modeling language, the security aware process of the methodology, and it also introduces the secTro, an automated tool to support the methodology. © 2011 Academy Publisher.
引用
收藏
页码:331 / 339
页数:8
相关论文
共 50 条
  • [1] Secure Tropos framework for software product lines requirements engineering
    Mellado, Daniel
    Mouratidis, Haralambos
    Fernandez-Medina, Eduardo
    COMPUTER STANDARDS & INTERFACES, 2014, 36 (04) : 711 - 722
  • [2] An Approach to Secure Legacy Software Systems
    Jasser, Stefanie
    Kelbert, Jonas
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 299 - 309
  • [3] Special issue on software engineering for secure systems
    Lee, Seok-Won
    Monga, Mattia
    COMPUTERS & SECURITY, 2010, 29 (03) : 299 - 301
  • [4] Teaching secure software engineering: Writing secure code
    Yu, Huiming
    Jones, Nadia
    Bullock, Gina
    Yuan, Xiaohong Yuan
    2011 7th Central and Eastern European Software Engineering Conference, CEE-SECR 2011, 2011,
  • [5] Secure software engineering processes
    Essafi, Mehrez
    Ben Ghezala, Henda
    3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, PROCEEDINGS, 2005, : 295 - 298
  • [6] From Hippocratic databases to secure tropos: A computer-aided re-engineering approach
    Massacci, Fabio
    Mylopoulos, John
    Zannone, Nicola
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2007, 17 (02) : 265 - 284
  • [7] Adaption of a Secure Software Development Methodology for Secure Engineering Design
    Von Solms, Sune
    Futcher, Lynn A.
    IEEE ACCESS, 2020, 8 : 125630 - 125637
  • [8] Secure tropos: A security-oriented extension of the tropos methodology
    Mouratidis, Haralambos
    Giorgini, Paolo
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2007, 17 (02) : 285 - 309
  • [9] A security specific knowledge modelling approach for secure software engineering
    Abeyrathna, A.
    Samarage, C.
    Dahanayake, B.
    Wijesiriwardana, C.
    Wimalaratne, P.
    JOURNAL OF THE NATIONAL SCIENCE FOUNDATION OF SRI LANKA, 2020, 48 (01): : 93 - 98
  • [10] Special section on Software Engineering for Secure Systems (SESS '07)
    Lee, Seok-Won
    Monga, Mattia
    INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (07) : 1150 - 1151