2006
DOI: 10.1007/11767138_4
|View full text |Cite
|
Sign up to set email alerts
|

Designing Security Requirements Models Through Planning

Abstract: Abstract. The quest for designing secure and trusted software has led to refined Software Engineering methodologies that rely on tools to support the design process. Automated reasoning mechanisms for requirements and software verification are by now a well-accepted part of the design process, and model driven architectures support the automation of the refinement process. We claim that we can further push the envelope towards the automatic exploration and selection among design alternatives and show that this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2006
2006
2024
2024

Publication Types

Select...
7
1

Relationship

3
5

Authors

Journals

citations
Cited by 28 publications
(22 citation statements)
references
References 21 publications
0
22
0
Order By: Relevance
“…A model-based planning strategy for security requirements is described in [4]. A high-level model instead of source code is used to verify the formal properties of functional and security requirements.…”
Section: Related Workmentioning
confidence: 99%
“…A model-based planning strategy for security requirements is described in [4]. A high-level model instead of source code is used to verify the formal properties of functional and security requirements.…”
Section: Related Workmentioning
confidence: 99%
“…There are many services around the web and each one has a limited functionality. In many cases, a single web service is not sufficient to respond to the user's request and often services should be combined through a pattern of composition to achieve a specific goal [3,5,7,9,22,29]. Such a composition is carried out manually at present, which means that a user needs to execute all these services one by one and these tasks can be time and effort consuming.…”
Section: A Motivating Examplementioning
confidence: 99%
“…As an example application, we consider the work by Hu, who has used the web service paradigm in an effort to make the communication between police departments and UK government agencies more effective [3,23,29]. Each of the providers (the agencies) offers data and enquiry capabilities to the police forces (a range of services are offered as shown in Figure 1).…”
Section: A Motivating Examplementioning
confidence: 99%
See 1 more Smart Citation
“…The idea of casting the problem of designing a set of delegations for a sociotechnical system into a planning one has already been presented in [4,3]. In addition, [3] proposes a preliminary approach to the evaluation of alternatives.…”
Section: Introductionmentioning
confidence: 99%