Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
A knowledge level software engineering methodology for agent oriented programming
Proceedings of the fifth international conference on Autonomous agents
The Gaia Methodology for Agent-Oriented Analysis and Design
Autonomous Agents and Multi-Agent Systems
SecureUML: A UML-Based Modeling Language for Model-Driven Security
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
Modeling Early Requirements in Tropos: A Transformation Based Approach
AOSE '01 Revised Papers and Invited Contributions from the Second International Workshop on Agent-Oriented Software Engineering II
A Requirements-Driven Development Methodology
CAiSE '01 Proceedings of the 13th International Conference on Advanced Information Systems Engineering
A security-aware metamodel for multi-agent systems (MAS)
Information and Software Technology
Modeling and analysis of security trade-offs - A goal oriented approach
Data & Knowledge Engineering
CAiSE '09 Proceedings of the 21st International Conference on Advanced Information Systems Engineering
Allocating goals to agent roles during MAS requirements engineering
AOSE'06 Proceedings of the 7th international conference on Agent-oriented software engineering VII
A goal oriented approach for modeling and analyzing security trade-offs
ER'07 Proceedings of the 26th international conference on Conceptual modeling
Application of digital ecosystem design methodology within the health domain
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Consolidating diagram types from several agent-oriented methodologies
Proceedings of the 2010 conference on New Trends in Software Methodologies, Tools and Techniques: Proceedings of the 9th SoMeT_10
Security and trust requirements engineering
Foundations of Security Analysis and Design III
A survey of security issue in multi-agent systems
Artificial Intelligence Review
Value-based argumentation for designing and auditing security measures
Ethics and Information Technology
Hi-index | 0.00 |
Security plays an important role in the development of multiagent systems. However, a careful analysis of software development processes shows that the definition of security requirements is, usually, considered after the design of the system. This is, mainly, due to the fact that agent oriented software engineering methodologies have not integrated security concerns throughout their developing stages. The integration of security concerns during the whole range of the development stages could help towards the development of more secure multiagent systems. In this paper we introduce extensions to the Tropos methodology to enable it to model security concerns throughout the whole development process. A description of the new concepts is given along with an explanation of how these concepts are integrated to the current stages of Tropos. An example from the health care sector is used to illustrate the above.