Adapting Secure Tropos for security risk management in the early phases of information systems development

被引:0
|
作者
Matulevicius, Raimundas [1 ]
Mayer, Nicolas [1 ,2 ]
Mouratidis, Haralambos [3 ]
Dubois, Eric [2 ]
Heymans, Patrick [1 ]
Genon, Nicolas [1 ]
机构
[1] Univ Namur, Fac Comp Sci, PReCISE, Namur, Belgium
[2] CITI, CRP Henri Tudor, Luxembourg, Luxembourg
[3] Univ East London, Sch Comp Technol, London, England
来源
ADVANCED INFORMATION SYSTEMS ENGINEERING, PROCEEDINGS | 2008年 / 5074卷
关键词
risk management; information system; security; Secure Tropos;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is a major target for today's information systems (IS) designers. Security modelling languages exist to reason on security in the early phases of IS development, when the most crucial design decisions are made. Reasoning on security involves analysing risk, and effectively communicating risk-related information. However, we think that current languages can be improved in this respect. In this paper, we discuss this issue for Secure Tropos, the language supporting the eponymous agent-based IS development. We analyse it and suggest improvements in the light of an existing reference model for IS security risk management. This allows for checking Secure Tropos concepts and terminology against those of current risk management standards, thereby improving the conceptual appropriateness of the language. The paper follows a running example, called eSAP, located in the healthcare domain.
引用
收藏
页码:541 / +
页数:3
相关论文
共 50 条
  • [1] Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management
    Matulevicius, Raimundas
    Mouratidis, Haralambos
    Mayer, Nicolas
    Dubois, Eric
    Heymans, Patrick
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2012, 18 (06) : 816 - 844
  • [2] Enterprise Risk Management and Information Systems Security Risk
    Olson, David L.
    Wu, Desheng
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON RISK MANAGEMENT & GLOBAL E-BUSINESS, VOLS I AND II, 2009, : 1 - 5
  • [3] Aligning Security and Privacy to Support the Development of Secure Information Systems
    Mouratidis, Haralambos
    Kalloniatis, Christos
    Islam, Shareeful
    Huget, Marc-Philippe
    Gritzalis, Stefanos
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2012, 18 (12) : 1608 - 1627
  • [4] Secure Information Systems development -: Based on a security requirements engineering process
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 467 - +
  • [5] Risk management for information systems development
    Powell, PL
    Klein, JH
    JOURNAL OF INFORMATION TECHNOLOGY, 1996, 11 (04) : 309 - 319
  • [6] 1 Information Security Risk Management for Systems Engineers
    Gauvain, Tony
    INCOSE International Symposium, 1999, 9 (01): : 780 - 785
  • [7] A management perspective on risk of security threats to information systems
    Farahmand F.
    Navathe S.B.
    Sharp G.P.
    Enslow P.H.
    Information Technology and Management, 2005, 6 (2-3) : 203 - 225
  • [8] Information Security Risk Management in Critical Informative Systems
    Kiran, K. V. D.
    Reddy, L. S. S.
    Kumar, Velagapudi Pavan
    Dheeraj, Kalluri Krishna Sai
    2014 CONFERENCE ON IT IN BUSINESS, INDUSTRY AND GOVERNMENT (CSIBIG), 2014,
  • [9] USER PARTICIPATION IN INFORMATION SYSTEMS SECURITY RISK MANAGEMENT
    Spears, Janine L.
    Barki, Henri
    MIS QUARTERLY, 2010, 34 (03) : 503 - 522
  • [10] User participation in information systems security risk management
    Spears J.L.
    Barki H.
    MIS Quarterly: Management Information Systems, 2010, 34 (SPEC. ISSUE 3): : 503 - 522