2007
DOI: 10.1142/s0218194007003240
|View full text |Cite
|
Sign up to set email alerts
|

Secure Tropos: A Security-Oriented Extension of the Tropos Methodology

Abstract: Although security plays an important role in the development of multiagent systems, a careful analysis of software development processes shows that the definition of security requirements is, usually, considered after the design of the system. One of the reasons is the fact that agent oriented software engineering methodologies have not integrated security concerns throughout their developing stages. The integration of security concerns during the whole range of the development stages can help towards the deve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
246
0
6

Year Published

2013
2013
2019
2019

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 315 publications
(252 citation statements)
references
References 33 publications
(66 reference statements)
0
246
0
6
Order By: Relevance
“…The majority considers privacy as a security constraint. For example, Secure Tropos an extension of Tropos methodology proposed in [3] employs the concepts of security constraint, and secure dependency in order to model and analyze security issues during the requirements engineering phase. Similarly, the SecReq approach introduced in [4] describes a systematic approach to derive security requirements from system security objectives.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…The majority considers privacy as a security constraint. For example, Secure Tropos an extension of Tropos methodology proposed in [3] employs the concepts of security constraint, and secure dependency in order to model and analyze security issues during the requirements engineering phase. Similarly, the SecReq approach introduced in [4] describes a systematic approach to derive security requirements from system security objectives.…”
Section: Related Workmentioning
confidence: 99%
“…A cloud vendor may rely on other provider's subcontractor services in order to offer its services. That should not be an obstacle for users to intervene 3 with their data in case they suspects that their privacy is violated by the subcontractors. In fact cloud vendors must be able to provide all the technical, organizational and contractual means for accomplishing this functionality for the user including all respective subcontractors that the vendor cooperates and interrelates [20].…”
Section: Intervenabilitymentioning
confidence: 99%
See 2 more Smart Citations
“…Several RE researchers suggested concepts for capturing trust relationships (e.g. [15]), but no previous work according to our knowledge, has studied the role of trust in enhancing information integrity. In this paper, we discuss the effect of trust over goal and permission delegation, since it represents the mental counter-part of delegation [9].…”
Section: Critical Information and Critical Goalmentioning
confidence: 99%