World Scientific
  • Search
  •   
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

SECURE TROPOS: A SECURITY-ORIENTED EXTENSION OF THE TROPOS METHODOLOGY

    https://doi.org/10.1142/S0218194007003240Cited by:267 (Source: Crossref)

    Although security plays an important role in the development of multiagent systems, a careful analysis of software development processes shows that the definition of security requirements is, usually considered after the design of the system. One of the reasons is the fact that agent oriented software engineering methodologies have not integrated security concerns throughout their developing stages. The integration of security concerns during the whole range of the development stages can help in the development of more secure multiagent systems. In this paper we introduce extensions to the Tropos methodology to enable it to model security concerns throughout the whole development process. A description of the new concepts and modelling activities is given together with a discussion on how these concepts and modelling activities are integrated to the current stages of Tropos. A real life case study from the health and social care sector is used to illustrate the approach.

    References

    • R.   Anderson , Security Engineering: A Guide to Building Dependable Distributed Systems ( Wiley Computer Publishing , 2001 ) . Google Scholar
    • M. Andrieset al., Science of Computer Programming  (1999), DOI: 10.1016/S0167-6423(98)00023-9. Google Scholar
    • B. Bauer, J. Müller and J. Odell, Agent-Oriented Software Engineering, Lecture Notes in Computer Science, eds. P. Ciancarini and M. Wooldridge (Springer, Berlin, 2001) pp. 91–103. CrossrefGoogle Scholar
    • P. Beynon-Davies, European Journal of Information Systems  (1995). Google Scholar
    • M.   Bradshaw , Software Agents ( American Association Artificial Intelligence Publication , 1997 ) . Google Scholar
    • P.   Bresciani and P.   Giorgini , The Tropos analysis process as graph transformation system , Proc. Workshop on Agent-Oriented Methodologies (OOPSLA 2002) . Google Scholar
    • P.   Bresciani et al. , Agent Oriented Software Engineering II , Lecture Notes in Computer Science   2222 , eds. M.   Wooldridge and G.   Weiss ( Springer-Verlag , 2002 ) . Google Scholar
    • P. Brescianiet al., Journal of Autonomous Agents and Multi-Agent Systems 8(3), 203 (2004), DOI: 10.1023/B:AGNT.0000018806.20944.ef. Crossref, Web of ScienceGoogle Scholar
    • J. Castro, M. Kolp and J. Mylopoulos, Information Systems 27, 365 (2002), DOI: 10.1016/S0306-4379(02)00012-1. Crossref, Web of ScienceGoogle Scholar
    • L.   Chung and B.   Nixon , Dealing with non-functional requirements: Three experimental studies of a process-oriented approach , Proc. 17th Int. Conf. on Software Engineering , DOI: 10.1145/225014.225017 . Google Scholar
    • D. A. van Lamsweerde and S. Fickas, Science of Computer Programming  (1991), DOI: 10.1016/0167-6423(93)90021-G. Google Scholar
    • P.   Devanbu and S.   Stubblebine , Software engineering for security: A roadmap , Proc. Conf. on The Future of Software Engineering ( 2000 ) , DOI: 10.1145/336512.336559 . Google Scholar
    • R.   Evans et al. , MESSAGE: Methodology for Engineering Systems of Software Agents ( AgentLink Publication , 2001 ) . Google Scholar
    • K.   Fischer et al. , Towards Secure Mobile Multi-agent Based Electronic Marketplace Systems , Electronic Notes in Theoretical Computer Science   63 ( Elsevier , 2002 ) . CrossrefGoogle Scholar
    • P.   Giorgini , F.   Massacci and J.   Mylopoulos , Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard , Proc. 22nd Int. Conf. on Conceptual Modeling (ER '03) . Google Scholar
    • P. Giorginiet al., Requirements engineering meets trust management: Model, methodology, and reasoning, Proc. 2nd Int. Conf. on Trust Management (iTrust 2004), Lecture Notes in Computer Science 2995 (Springer-Verlag, Heidelberg, 2004) pp. 176–190. Google Scholar
    • F. Giunchiglia, J. Mylopoulos and A. Perini, The Tropos Software Development Methodology: Processes, Models and Diagrams, Lecture Notes in Computer Science 2585 (Springer, 2003) pp. 162–173. CrossrefGoogle Scholar
    • D.   Gollmann , Computer Security ( John Wiley , 2001 ) . Google Scholar
    • M.-P.   Huget , Nemo: An Agent-Oriented Software Engineering Methodology , Proc. OOPSLA Workshop on Agent-Oriented Methodologies , eds. J.   Debenham et al. ( 2002 ) . Google Scholar
    • C. A.   Iglesias et al. , Analysis and design of multiagent systems using MAS-CommonKADS , Workshop on Agent Theories, Architectures and Languages ( 1997 ) . Google Scholar
    • C.   Iglesias , M.   Garijo and J.   Gonzales , Intelligent Agents IV , Lecture Notes in Computer Science   1555 ( Springer-Verlag , 1999 ) . Google Scholar
    • W. Jansen, Computer Communications  (2000). Google Scholar
    • W. Jansen and T. Karygiannis, Mobile Agent Security, National Institute of Standards and Technology, Special Publication 800-19, August 1999 . Google Scholar
    • N. R. Jennings, Communications of the ACM 44(4), 35 (2001), DOI: 10.1145/367211.367250. Crossref, Web of ScienceGoogle Scholar
    • N. R.   Jennings and M.   Wooldridge , Agent-oriented software engineering , Proc. 9th European Workshop on Modelling Autonomous Agents in a Multi-Agent World: Multi-Agent System Engineering (MAAMAW-99) . Google Scholar
    • J.   Jürjens , Towards secure systems development with UMLsec , Int. Conf. on Fundamental Approaches to Software Engineering (FASE/ETAPS, 2001) . Google Scholar
    • J. Jürjens, UMLsec: Extending UML for secure systems development, UML 2002, Lecture Notes in Computer Science 2460 (Springer, 2002) pp. 412–425. Google Scholar
    • V. P.   Lane , Security of Computer Based Information Systems ( Macmillan Education , 1985 ) . CrossrefGoogle Scholar
    • L.   Liu , E.   Yu and J.   Mylopoulos , Analyzing security requirements as relationships among strategic actors , Proc. 2nd Symp. on Requirements Engineering for Information Security (SREIS '02) . Google Scholar
    • T.   Lodderstedt , D.   Basin and J.   Doser , SecureUML: A UML-based modelling language for model-driven security , Proc. 5th Int. Conf. on Unified Modeling Language ( 2002 ) . Google Scholar
    • H.   Mouratidis et al. , A natural extension of tropos methodology for modelling security , Proc. Agent Oriented Methodologies Workshop (OOPSLA 2002) . Google Scholar
    • H.   Mouratidis et al. , Using tropos methodology to model and integrated health assessment system , Proc. Fourth Int. Bi-Conference Workshop on Agent-Oriented Information Systems (AOIS-02) . Google Scholar
    • H. Mouratidis, P. Giorgini and G. Manson, Modelling secure multiagent systems, Proc. 2nd Int. Joint Conf. on Autonomous Agents and Multiagent Systems (ACM, 2003) pp. 859–866, DOI: 10.1145/860575.860713. Google Scholar
    • H.   Mouratidis , P.   Giorgini and G.   Manson , An ontology for modelling security: The tropos approach , Proc. 7th Int. Conf. on Knowledge-Based Intelligent Information and Engineering Systems (KES 2003) . Google Scholar
    • H. Mouratidis, A Security Oriented Approach in the Development of Multiagent Systems: Applied to the Management of the Health and Social Care Needs of Older People in England, PhD thesis, University of Sheffield, 2004 . Google Scholar
    • A.   Perini et al. , Towards an agent oriented approach to software engineering , Proc. Workshop Dagli Oggetti Agli Agenti: Tendenze Evolutive dei Sistemi Software . Google Scholar
    • G. C. Roman, IEEE Computer 18(4), 14 (1985), DOI: 10.1109/MC.1985.1662861. CrossrefGoogle Scholar
    • I. Sommerville, Software Engineering, 6th edn. (Addison-Wesley, 2001). Google Scholar
    • W.   Stallings , Cryptography and Network Security: Principles and Practice , 2nd edn. ( Prentice-Hall , 1999 ) . Google Scholar
    • E. Steegmans, J. Lewi, M. D'Haese, J. Dockx, D. Jehoul, B. Swennen, S. Van Baelen, and P. Van Hirtum, EROOS Reference Manual Version 1.0, Department of Computer Science, K. U. Leuven, CW Report 208, Leuven, B, 1995, 176 pp . Google Scholar
    • T. Tryfonas, E. Kiountouzis and A. Poulymenakou, Information Management & Computer Security 9(4), 183 (2001), DOI: 10.1108/09685220110401254. Crossref, Web of ScienceGoogle Scholar
    • M.   Wood and S. A.   DeLoach , Agent-Oriented Software Engineering , Lecture Notes in Computer Science   1957 , eds. P.   Ciancarini and M.   Wooldridge ( Springer Verlag , Berlin , 2001 ) . Google Scholar
    • M.   Wooldridge and P.   Ciancarini , Agent-Oriented Software Engineering , Lecture Notes in AI   1957 , eds. P.   Ciancarini and M.   Wooldridge ( Springer-Verlag , 2001 ) . CrossrefGoogle Scholar
    • M.   Wooldridge , N. R.   Jennings and D.   Kinny , A methodology for agent-oriented analysis and design , Agents '99: Proc. Third Int. Conf. on Autonomous Agents , eds. O.   Etzioni , J. P.   Muller and J.   Bradshaw . Google Scholar
    • E.   Yu and L.   Cysneiros , Designing for privacy and other competing requirements , 2nd Symp. on Requirements Engineering for Information Security (SREIS' 02) . Google Scholar
    • E. Yu, Modelling Strategic Relationships for Process Reengineering, PhD thesis, Department of Computer Science, University of Toronto, Canada, 1995 . Google Scholar
    • B. W.   Boehm , Software Engineering Economics ( Prentice Hall , 1981 ) . Google Scholar
    • C.   Meadows , A model of computation for the NRL protocol analyzer , Proc. 1994 Computer Security Foundations Workshop ( 1994 ) . Google Scholar
    • J.   McDermott and C.   Fox , Using abuse care models for security requirements analysis , Proc. 15th Annual Computer Security Applications Conference ( 1999 ) . Google Scholar
    • H.   Mouratidis , P.   Giorgini and G.   Manson , Integrating security and systems engineering: Towards the modelling of secure information systems , Proc. 15th Conf. on Advance Information Systems (CAiSE) . Google Scholar
    • P.   Giorgini et al. , Reasoning with goal models , Proc. 21st Int. Conf. on Conceptual Modeling (ER 2002) . Google Scholar
    • S.   Rohrig , Using process models to analyze health care security requirements , Int. Conf. Advances in Infrastructure for e-Business, e-Education, e-Science, and e-Medicine on the Internet . Google Scholar
    • B.   Schneier , Secrets & Lies: Digital Security in a Networked World ( John Wiley , 2000 ) . Google Scholar
    • M.   Schumacher and U.   Roedig , Security engineering with patterns , Proc. 8th Conf. on Pattern Languages for Programs (PLoP 2001) . Google Scholar
    • G.   Sindre and A. L.   Opdahl , Eliciting security requirements by misuse cases , Proc. TOOLS Pacific 2000 ( 2000 ) . Google Scholar