spacer
spacer search

Software Engineering for Service-Oriented Overlay Computers
Software Engineering for Service-Oriented Overlay Computers

Search
spacer
 
header
Main Menu
 
Home arrow Publications arrow All Publications

SENSORIA All Publications Print

Copyright Information
The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

show main publications


Security and Trust Requirements Engineering


@INPROCEEDINGS{gior-mass-zann-05-FOSAD,
  title = {{Security and Trust Requirements Engineering}},
  author = {{Paolo} {Giorgini} and {Fabio} {Massacci} and {Nicola} {Zannone}},
  booktitle = {Proceedings of the 5th International School on Foundations of Security Analysis and Design III (FOSAD 2005). September 19th-24th, 2005. Bertinoro (Ita},
  pages = {237--272},
  abstract = {Integrating security concerns throughout the whole software development process is one of today's challenges in software and requirements engineering research. A challenge that so far has proved difficult to meet. The major difficulty is that providing security does not only require to solve technical problems but also to reason on the organization as a whole. This makes the usage of traditional software engineering methologies difficult or unsatisfactory: most proposals focus on protection aspects of security and explicitly deal with low level protection mechanisms and only an handful of them show the ability of capturing the high-level organizational security requirements, without getting suddenly bogged down into security protocols or cryptography algorithms. In this paper we critically review the state of the art in security requirements engineering and discuss the motivations that led us to propose the Secure Tropos methodology, a formal framework for modelling and analyzing security, that enhances the agent-oriented software development methodology i*/Tropos. We illustrate the Secure Tropos approach, a comprehensive case study, and discuss some later refinements of the Secure Tropos methodology to address some of its shortcomings. Finally, we introduce the ST-Tool, a CASE tool that supports our methodology.},
  publisher = {Springer-Verlag},
  series = {LNCS},
  volume = {3655},
  year = {2005},
  url = {http://dit.unitn.it/~zannone/publication/gior-mass-zann-05-FOSAD.pdf},
  doi = {http://dx.doi.org/10.1007/11554578_8},
  status = {public},
  task = {T7.3, T7.4},
}

spacer

The Sensoria Project Website
2005 - 2010
spacer