A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
The grid: blueprint for a new computing infrastructure
The grid: blueprint for a new computing infrastructure
The unified software development process
The unified software development process
The Rational Unified Process: An Introduction, Second Edition
The Rational Unified Process: An Introduction, Second Edition
Challenge: integrating mobile wireless devices into the computational grid
Proceedings of the 8th annual international conference on Mobile computing and networking
Towards Development of Secure Systems Using UMLsec
FASE '01 Proceedings of the 4th International Conference on Fundamental Approaches to Software Engineering
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
SecureUML: A UML-Based Modeling Language for Model-Driven Security
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
UMLsec: Extending UML for Secure Systems Development
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
Model driven security for process-oriented systems
Proceedings of the eighth ACM symposium on Access control models and technologies
Communication Paradigms for Mobile Grid Users
CCGRID '03 Proceedings of the 3st International Symposium on Cluster Computing and the Grid
Security-Critical System Development with Extended Use Cases
APSEC '03 Proceedings of the Tenth Asia-Pacific Software Engineering Conference Software Engineering Conference
Scheduling in the Grid application development software project
Grid resource management
Bringing security home: a process for developing secure and usable systems
Proceedings of the 2003 workshop on New security paradigms
Mobile OGSI.NET: Grid Computing on Mobile Devices
GRID '04 Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing
A framework for security requirements engineering
Proceedings of the 2006 international workshop on Software engineering for secure systems
A Grid Service Infrastructure for Mobile Devices
SKG '05 Proceedings of the First International Conference on Semantics, Knowledge and Grid
Integrating Security and Software Engineering: Advances and Future Vision
Integrating Security and Software Engineering: Advances and Future Vision
Grid Computing Security: A Taxonomy
IEEE Security and Privacy
PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Mobile-to-Grid middleware: bridging the gap between mobile and grid environments
EGC'05 Proceedings of the 2005 European conference on Advances in Grid Computing
The 5th international workshop on software engineering for secure systems (SESS'09)
ICSE '09 COMPANION Proceedings of the 2009 31st International Conference on Software Engineering: Companion Volume
Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application
ER '09 Proceedings of the ER 2009 Workshops (CoMoL, ETheCoM, FP-UML, MOST-ONISW, QoIS, RIGiM, SeCoGIS) on Advances in Conceptual Modeling - Challenging Perspectives
Analysis of Secure Mobile Grid Systems: A systematic approach
Information and Software Technology
A mathematical reusability model for quantifying the reduction in development effort
ACM SIGSOFT Software Engineering Notes
Security services architecture for Secure Mobile Grid Systems
Journal of Systems Architecture: the EUROMICRO Journal
Systematic design of secure Mobile Grid systems
Journal of Network and Computer Applications
Hi-index | 0.00 |
Due to the growing complexity of software development, developing software through systematic processes is becoming more and more important. Likewise, it is important that the development process used integrates security aspects from the first stages at the same level as other functional and non-functional requirements. In the last years, GRID technology has shown to be the most important one and it allows us to build very complex information systems with different and remarkable features (interoperability between multiple security domains, cross-domain authentication and authorization, dynamic, heterogeneous and limited mobile devices, etc). Traditionally, systems based on GRID Computing have not been developed through adequate methodologies and have not taken into account security requirements throughout their development, only offering security technical solutions at the implementation stages. This paper shows part of a development methodology that we are elaborating for the construction of information systems based on Grid Computing highly dependent on mobile devices where security plays a very important role. Specifically, in this paper, we will present the analysis phase, managed by reusable use cases through which we can define the requirements and needs of these systems obtaining an analysis model that can be used as input to the following phase of the methodology, the design phase of mobile Grid systems.