Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management

Raimundas Matulevicius, Haralambos Mouratidis, Nicolas Mayer, Eric Dubois, Patrick Heymans

Résultats de recherche: Contribution à un journal/une revueArticle


The need to consider security from the early stages of the development process of information systems has been argued by academics and industrialists alike, and security risk management has been recognised as one of the most prominent techniques for eliciting security requirements. However, although existing security modelling languages provide some means to model security aspects, they do not contain concrete constructs to address vulnerable system assets, their risks, and risk treatments. Furthermore, security languages do not provide a crosscutting viewpoint relating all three - assets, risks and risk treatments - together. This is problematic since, for a security analyst, it is difficult to detect what the potential security flaws could be, and how they need to be fixed. In this paper, we extend the Secure Tropos language, an agent and goal-oriented security modelling language to support modelling of security risks. Based on previous work, where we had observed some inadequacies of this language to modelsecurity risks, this paper suggests improvements of Secure Tropos semantics and syntax. On the syntax level we extend the concrete and abstract syntax of the language, so that it covers the security risk management domain. On the semantic level, we illustrate how language constructs need to be improved to address the three different levels of security risk management. The suggested improvements are illustrated with the aid of a running example, called eSAP, from the healthcare domain.
langue originaleAnglais
Pages (de - à)816-844
Nombre de pages29
journalJournal of Universal Computer Science
Numéro de publication6
Etat de la publicationPublié - 1 janv. 2012

Empreinte digitale

Examiner les sujets de recherche de « Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management ». Ensemble, ils forment une empreinte digitale unique.

Contient cette citation