Copyright Information
The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of
scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other
copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying
this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without
the explicit permission of the copyright holder.
show main publications
Computer-Aided Support for Secure Tropos @ARTICLE{MASS-MYLO-ZANN-07-ASE, title = {{Computer-Aided Support for Secure Tropos}}, author = {{Fabio} {Massacci} and {John} {Mylopolous} and {Nicola} {Zannone}}, journal = {Automated Software Engineering}, pages = {341-364}, abstract = {In earlier work, we have introduced Secure Tropos, a requirements engineering methodology that extends the Tropos methodology and is intended for the design and analysis of security requirements. This paper briefly recaps the concepts proposed for capturing security aspects, and presents an implemented graphical CASE tool that supports the Secure Tropos methodology. Specifically, the tool supports the creation of Secure Tropos models, their translation to formal specifications, as well as the analysis of these specifications to ensure that they comply with specific security properties. Apart from presenting the tool, the paper also presents a two-tier evaluation consisting of two case studies and an experimental evaluation of the tool's scalability.}, volume = {14}, number = {3}, year = {2007}, url = {http://www.cs.toronto.edu/~zannone/publication/mass-mylo-zann-07-ASE.pdf}, keywords = {Automated Reason- ing Security Requirements Engineering, Automated Reasoning, CASE tools, Security Requirements Engineering}, month = {September}, partner = {UNITN}, status = {public}, task = {T4.4}, }
|