2009
DOI: 10.1007/978-3-642-04879-1_2
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Secure Tropos to Effectively Deal with Security Requirements in the Development of Multiagent Systems

Abstract: Abstract. The consideration of security requirements in the development of multi-agent systems is a very difficult task. However, only few approaches have been proposed that try to integrate security issues as internal part of the development process. Amongst them, secure Tropos has been proposed as a structured approach towards the consideration of security issues in the development of multiagent systems. In this paper we enhance secure Tropos by integrating to its stages: (i) a process for selecting amongst … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0
1

Year Published

2009
2009
2014
2014

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 16 publications
(16 citation statements)
references
References 10 publications
0
15
0
1
Order By: Relevance
“…There are four different abstraction layers defined that describe different stages of requirements and layers of design. Secure Tropos [8] is an extension to the original Tropos methodology by adding security constraints and secure entities as well as the concepts of ownership, trust and dependency. The Secure Tropos methodology does not allow the designer to model any OWASP TOP 10 threat directly within the model, still there are some software solutions, like ScTro 2 , that support the software engineer during the design and requirements analysis phase.…”
Section: Goal Driven Approachesmentioning
confidence: 99%
“…There are four different abstraction layers defined that describe different stages of requirements and layers of design. Secure Tropos [8] is an extension to the original Tropos methodology by adding security constraints and secure entities as well as the concepts of ownership, trust and dependency. The Secure Tropos methodology does not allow the designer to model any OWASP TOP 10 threat directly within the model, still there are some software solutions, like ScTro 2 , that support the software engineer during the design and requirements analysis phase.…”
Section: Goal Driven Approachesmentioning
confidence: 99%
“…There exist two extensions of Tropos called Secure Tropos: one by Mouratidis et al [60][61][62], and another one by Massacci et al [63]. Furthermore, there exists an extension of the i * -modeling framework called Secure i • Security constraint: A security constraint is defined as ''a restriction related to security issues, such as privacy, integrity and availability, which can influence the analysis and design of a multiagent system under development by restricting some alternative design solutions, by conflicting with some of the requirements of the system, or by refining some of the system's objectives.''…”
Section: Secure I * and Secure Troposmentioning
confidence: 99%
“…7) is the actor's knowledge of the world. All these constructs are present in both Tropos [23] [24] and Secure Tropos [9], [21], [22]. In addition Secure TROPOS introduces Security constraint and Threat.…”
Section: Secure Troposmentioning
confidence: 99%
“…A security constraint represents a restriction related to security that the system must have and actors must respect (see Fig. 3) [5] [21]. A threat (see Fig.…”
Section: Secure Troposmentioning
confidence: 99%
See 1 more Smart Citation