Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning
نویسندگان
چکیده
The last years have seen a number of proposals to incorporate Security Engineering into mainstream Software Requirements Engineering. However, capturing trust and security requirements at an organizational level (as opposed to a design level) is still an open problem. This paper presents a formal framework for modeling and analyzing security and trust requirements. It extends the Tropos methodology, an agent-oriented software engineering methodology. The key intuition is that in modeling security and trust, we need to distinguish between the actors that manipulate resources, accomplish goals or execute tasks, and actors that own the resources or the goals. To analyze an organization and its information systems, we proceed in two steps. First, we built a trust model, determining the trust relationships among actors, and then we give a functional model, where we analyze the actual delegations against the trust model, checking whether an actor that offers a service is authorized to have it. The formal framework allows for the automatic verification of security and trust requirements by using a suitable delegation logic that can be mechanized within Datalog. To make the discussion more concrete, we illustrate the proposal with a Health Care case study. keywords : Requirements Engineering for Security and Trust, AgentOriented Technologies, Security Engineering, Trust Models for Modeling Business and Organizations
منابع مشابه
A systematic review of security requirements engineering
a r t i c l e i n f o One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased manner, that is, none of them perform a systematic review of security requirements engineering, and there is not, there...
متن کاملFacilitating the Practical Evaluation of Organizational Memories Using the Goal-Question-Metric Technique
It is an important industrial need to deliver high-quality knowledge-based systems and organizational memories (e.g., to support service management or knowledge management in general). Evaluation is required to ensure this high quality and guide the development and maintenance. We present an approach for facilitating practical evaluation of organizational memories that meets the requirements fo...
متن کاملRequirements Engineering Model in Designing Complex Systems
This research tends to development of the requirements elicitation methodology with regard to operational nature and hierarchical analysis for complex systems and also, regarding available technologies. This methodology applies Analytic Hierarchy Process (AHP) and Analytic Network Process (ANP) to ensure traceability of planned qualitative and quantitative data from requirements to available te...
متن کاملRequirements Engineering Model in Designing Complex Systems
This research tends to development of the requirements elicitation methodology with regard to operational nature and hierarchical analysis for complex systems and also, regarding available technologies. This methodology applies Analytic Hierarchy Process (AHP) and Analytic Network Process (ANP) to ensure traceability of planned qualitative and quantitative data from requirements to available te...
متن کاملExternal COMSEC Adaptor Software Engineering Methodology
Approved for public release; distribution unlimited.ABSTRACT The External COMSEC Adaptor (ECA) is a device responsible for providing cryptographic protection of information based on rules that (possibly coarsely) define the sensitivity of that information. The ECA is trusted to satisfy a set of critical requirements that support data confidentiality in the network in which it is embedded. Ensur...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004