Dealing with non-functional requirements: three experimental studies of a process-oriented approach
Proceedings of the 17th international conference on Software engineering
SAAM: a method for analyzing the properties of software architectures
ICSE '94 Proceedings of the 16th international conference on Software engineering
Software architecture in practice
Software architecture in practice
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Seven good reasons for mobile agents
Communications of the ACM
Design and use of software architectures: adopting and evolving a product-line approach
Design and use of software architectures: adopting and evolving a product-line approach
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
SecureUML: A UML-Based Modeling Language for Model-Driven Security
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
ER '02 Proceedings of the 21st International Conference on Conceptual Modeling
A Goal-Based Organizational Perspective on Multi-agent Architectures
ATAL '01 Revised Papers from the 8th International Workshop on Intelligent Agents VIII
A Requirements-Driven Development Methodology
CAiSE '01 Proceedings of the 13th International Conference on Advanced Information Systems Engineering
Using Abuse Case Models for Security Requirements Analysis
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
Model Checking Early Requirements Specifications in Tropos
RE '01 Proceedings of the Fifth IEEE International Symposium on Requirements Engineering
Modelling strategic relationships for process reengineering
Modelling strategic relationships for process reengineering
Architectural styles and the design of network-based software architectures
Architectural styles and the design of network-based software architectures
Tropos: An Agent-Oriented Software Development Methodology
Autonomous Agents and Multi-Agent Systems
SP 800-19. Mobile Agent Security
SP 800-19. Mobile Agent Security
Countermeasures for mobile agent security
Computer Communications
Secure information systems engineering: a manifesto
International Journal of Electronic Security and Digital Forensics
MOBMAS: A methodology for ontology-based multi-agent systems development
Information and Software Technology
Journal of Systems and Software
ER '07 Tutorials, posters, panels and industrial contributions at the 26th international conference on Conceptual modeling - Volume 83
Proceedings of the 4th International Conference on Design Science Research in Information Systems and Technology
Hi-index | 0.01 |
Although security is a crucial issue for information systems, traditionally, it is considered after the definition of the system. This approach often leads to problems, which most of the times translate into security vulnerabilities. From the viewpoint of the traditional security paradigm, it should be possible to eliminate such problems through better integration of security and software engineering. This paper firstly argues for the need to develop a methodology that considers security as an integral part of the whole system development process, and secondly it contributes to the current state of the art by proposing an approach that considers security concerns as an integral part of the entire system development process and by relating this approach with existing work. The different stages of the approach are described with the aid of a real-life case study; a health and social care information system.