Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management

Raimundas Matulevicius, Haralambos Mouratidis, Nicolas Mayer, Eric Dubois, Patrick Heymans

Research output: Contribution to journalArticle

Abstract

The need to consider security from the early stages of the development process of information systems has been argued by academics and industrialists alike, and security risk management has been recognised as one of the most prominent techniques for eliciting security requirements. However, although existing security modelling languages provide some means to model security aspects, they do not contain concrete constructs to address vulnerable system assets, their risks, and risk treatments. Furthermore, security languages do not provide a crosscutting viewpoint relating all three - assets, risks and risk treatments - together. This is problematic since, for a security analyst, it is difficult to detect what the potential security flaws could be, and how they need to be fixed. In this paper, we extend the Secure Tropos language, an agent and goal-oriented security modelling language to support modelling of security risks. Based on previous work, where we had observed some inadequacies of this language to modelsecurity risks, this paper suggests improvements of Secure Tropos semantics and syntax. On the syntax level we extend the concrete and abstract syntax of the language, so that it covers the security risk management domain. On the semantic level, we illustrate how language constructs need to be improved to address the three different levels of security risk management. The suggested improvements are illustrated with the aid of a running example, called eSAP, from the healthcare domain.
Original languageEnglish
Pages (from-to)816-844
Number of pages29
JournalJournal of Universal Computer Science
Issue number6
Publication statusPublished - 1 Jan 2012

Keywords

  • syntax and semantics of modelling language
  • secure tropos
  • risk management
  • information system
  • security

Fingerprint

Dive into the research topics of 'Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management'. Together they form a unique fingerprint.

Cite this