Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Volume 18 / Issue 6

available in:   PDF (2 MB) PS (5 MB)
 
get:  
Similar Docs BibTeX   Write a comment
  
get:  
Links into Future
 
DOI:   10.3217/jucs-018-06-0816

 

Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management

Raimundas Matulevičius (University of Tartu, Estonia)

Haralambos Mouratidis (University of East London, United Kingdom)

Nicolas Mayer (CRP Henri Tudor, Luxembourg)

Eric Dubois (CRP Henri Tudor, Luxembourg)

Patrick Heymans (University of Namur, Belgium)

Abstract: The need to consider security from the early stages of the development process of information systems has been argued by academics and industrialists alike, and security risk management has been recognised as one of the most prominent techniques for eliciting security requirements. However, although existing security modelling languages provide some means to model security aspects, they do not contain concrete constructs to address vulnerable system assets, their risks, and risk treatments. Furthermore, security languages do not provide a crosscutting viewpoint relating all three - assets, risks and risk treatments - together. This is problematic since, for a security analyst, it is difficult to detect what the potential security flaws could be, and how they need to be fixed. In this paper, we extend the Secure Tropos language, an agentand goal-oriented security modelling language to support modelling of security risks. Based on previous work, where we had observed some inadequacies of this language to model security risks, this paper suggests improvements of Secure Tropos semantics and syntax. On the syntax level we extend the concrete and abstract syntax of the language, so that it covers the security risk management domain. On the semantic level, we illustrate how language constructs need to be improved to address the three different levels of security risk management. The suggested improvements are illustrated with the aid of a running example, called eSAP, from the healthcare domain.

Keywords: information system, risk management, secure tropos, security, syntax and semantics of modelling language

Categories: D.2.1, D.2.2, H.1, H.4.2, J.6