Comparison between Secure Tropos and VOSREP

نویسندگان

  • Chandana das
  • Pardeep kumar Sharma
  • Kritika Chaudhry
چکیده

Security is the main concern now days for any software system. In the past security was often treated as an add-on on other requirements, which make the system expensive on both the developer and user sides. Computer system security attacks are one of the most urgent problems facing IT professionals today. Security engineering should be integrated with the Software development life cycle to handle all the issue related to the software security. There are various techniques for addressing security requirements during the early phases of Software Development Life Cycle (SDLC).In this paper we are comparing two existing technique Secure Tropos and VOSREP with the help of example medical information system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos

Secure Tropos, an extension of the Tropos methodology, considers security requirements alongside functional requirements, from the early stages of the system development process. The Secure Tropos language uses security concepts such as security constraint, secure goal, secure plan, secure resource, and threat to capture the security concepts from both social and organisational settings. These ...

متن کامل

SecTro: A CASE Tool for Modelling Security in Requirements Engineering using Secure Tropos

Secure Tropos is an extension of Tropos methodology, which considers security throughout the whole development process. The main concept of Secure Tropos is the security constraint that captures constraints regarding security. Similarly, the concepts of dependency, goal, task, resource, and capability were also extended with security in mind. In this paper we present the SecTro tool, a CASE too...

متن کامل

Secure Software Systems Engineering: The Secure Tropos Approach (Invited Paper)

This paper discusses the secure Tropos methodology. This is the first paper in the literature that discusses all the aspects of the methodology as it has evolved over the last 10 years. In particular, the paper discusses the Secure Tropos modeling language, the security aware process of the methodology, and it also introduces the secTro, an automated tool to support the methodology.

متن کامل

Use Case Application in Requirements Analysis using Secure Tropos to UMLsec - Security Issues

Information Systems Security is one of the most critical challenges presently facing nearly every one of the organizations. However, making certain security and quality in both information and the systems which control information is a difficult goal necessitating the mixture of two wide research disciplines which are typically separate: security engineering and secure software engineering. Sec...

متن کامل

Secure Tropos: dealing effectively with security requirements in the development of multiagent systems

The consideration of security requirements in the development of multi-agent systems is a very difficult task. However, only few approaches have been proposed that try to integrate security issues as internal part of the development process. Amongst them, secure Tropos has been proposed as a structured approach towards the consideration of security issues in the development of multiagent system...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012