Artificial intelligence: a modern approach
Artificial intelligence: a modern approach
Software Engineering: Theory and Practice
Software Engineering: Theory and Practice
Secure systems development based on the common criteria: the PalME project
ACM SIGSOFT Software Engineering Notes
SecureUML: A UML-Based Modeling Language for Model-Driven Security
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
Software Security Checklist for the Software Life Cycle
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Threat Modeling
Software Security: Building Security In
Software Security: Building Security In
A framework for security requirements engineering
Proceedings of the 2006 international workshop on Software engineering for secure systems
Using model-based security analysis in component-oriented system development
Proceedings of the 2nd ACM workshop on Quality of protection
Enterprise Security Architecture: A Business-Driven Approach
Enterprise Security Architecture: A Business-Driven Approach
Computer Standards & Interfaces
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Software Security Engineering: A Guide for Project Managers (The SEI Series in Software Engineering)
Software Security Engineering: A Guide for Project Managers (The SEI Series in Software Engineering)
Assisting Human Decision Making with Intelligent Technologies
KES '08 Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part I
Option Based Evaluation: Security Evaluation of IT Products Based on Options Theory
ECBS-EERC '09 Proceedings of the 2009 First IEEE Eastern European Conference on the Engineering of Computer Based Systems
Integrating security and systems engineering: towards the modelling of secure information systems
CAiSE'03 Proceedings of the 15th international conference on Advanced information systems engineering
Calculating optimal decision using meta-level agents for multi-agents in networks
KES'07/WIRN'07 Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part I
Approach to solving security problems using meta-agents in multi agent system
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
Layered security architecture for threat management using multi-agent system
ACM SIGSOFT Software Engineering Notes
Hi-index | 0.00 |
Software systems become distributed and complex. Distributed systems are crucial for organizations since they provide possibility to share data and information, resources and services. Nowadays, many software systems are not developed from scratch: system development involves reuse of already developed components. However, with the intrusion in the computer systems, it has become important that systems must fulfill security goals and requirements. Moreover, interdependencies of components create problems during integration phase. Therefore, security properties of components should be considered and evaluated earlier in the lifecycle. In this paper, we propose an agent-oriented process that supports verification of fulfillment of security goals and validation of security requirements during different phases of development lifecycle. Moreover, the system needs to support mapping of security requirements to threat list to determine if any of the attacks in the list is applicable to the system to be developed. This is performed by the meta-agents. These meta-agents automatically create a security checklist, as well as, provide control of actions taken by human agent.