Design patterns: elements of reusable object-oriented software
Design patterns: elements of reusable object-oriented software
Modelling strategic relationships for process reengineering
Modelling strategic relationships for process reengineering
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Eclipse Modeling Framework
Introducing Abuse Frames for Analysing Security Requirements
RE '03 Proceedings of the 11th IEEE International Conference on Requirements Engineering
Security and Privacy Requirements Analysis within a Social Setting
RE '03 Proceedings of the 11th IEEE International Conference on Requirements Engineering
Security Engineering with Patterns: Origins, Theoretical Models, and New Applications
Security Engineering with Patterns: Origins, Theoretical Models, and New Applications
Tropos: An Agent-Oriented Software Development Methodology
Autonomous Agents and Multi-Agent Systems
Software Engineering (7th Edition)
Software Engineering (7th Edition)
Elaborating Security Requirements by Construction of Intentional Anti-Models
Proceedings of the 26th International Conference on Software Engineering
From Goals to Aspects: Discovering Aspects from Requirements Goal Models
RE '04 Proceedings of the Requirements Engineering Conference, 12th IEEE International
The Effect of Trust Assumptions on the Elaboration of Security Requirements
RE '04 Proceedings of the Requirements Engineering Conference, 12th IEEE International
Eliciting security requirements with misuse cases
Requirements Engineering
Modeling Security Requirements Through Ownership, Permission and Delegation
RE '05 Proceedings of the 13th IEEE International Conference on Requirements Engineering
e-Service Design Using i* and e3value Modeling
IEEE Software
Security Design Based on Social Modeling
COMPSAC '06 Proceedings of the 30th Annual International Computer Software and Applications Conference - Volume 02
Towards automatic model synchronization from model transformations
Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering
Security Requirements Engineering: A Framework for Representation and Analysis
IEEE Transactions on Software Engineering
Model-driven migration of supervisory machine control architectures
Journal of Systems and Software
Computer Standards & Interfaces
Towards a comprehensive framework for secure systems development
CAiSE'06 Proceedings of the 18th international conference on Advanced Information Systems Engineering
An empirical evaluation of the i* framework in a model-based software generation environment
CAiSE'06 Proceedings of the 18th international conference on Advanced Information Systems Engineering
A goal-oriented approach for the generation and evaluation of alternative architectures
ECSA'07 Proceedings of the First European conference on Software Architecture
RELAW '09 Proceedings of the 2009 Second International Workshop on Requirements Engineering and Law
Hi-index | 0.01 |
Patterns are useful knowledge about recurring problems and solutions. Detecting a security problem using patterns in requirements models may lead to its early solution. In order to facilitate early detection and resolution of security problems, in this paper, we formally describe a role-based access control (RBAC) as a pattern that may occur in stakeholder requirements models. We also implemented in our goal-oriented modeling tool the formally described pattern using model-driven queries and transformations. Applied to a number of requirements models published in literature, the tool automates the detection and resolution of the security pattern in several goal-oriented stakeholder requirements.