Towards transformation guidelines from secure tropos to misuse cases (position paper)

  • Authors:
  • Naved Ahmed;Raimundas Matulevičius

  • Affiliations:
  • University of Tartu, Tartu, Estonia;University of Tartu, Tartu, Estonia

  • Venue:
  • Proceedings of the 7th International Workshop on Software Engineering for Secure Systems
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

(IS) requires that the security concerns should be properly articulated well ahead in early requirement engineering (RE) along with other functional and non-functional requirements. In this paper, based on the domain model for IS security risk management (SRM) we propose a set of transformation guidelines to translate Secure Tropos models to the misuse case diagrams. We believe that such a model translation would help developers to elicit real security needs by integrating the security analysis starting from early requirement stages to all the stages of development process. The translation aligns the IS security concerns with functional requirements and maintains traceability of the security decisions to their origin.