Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems

  • Haralambos Mouratidis
  • Paolo Giorgini
  • Gordon Manson
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2681)

Abstract

Security is a crucial issue for information systems. Traditionally, security is considered after the definition of the system. However, this approach often leads to problems, which translate into security vulnerabilities. From the viewpoint of the traditional security paradigm, it should be possible to eliminate such problems through better integration of security and systems engineering. This paper argues for the need to develop a methodology that considers security as an integral part of the whole system development process. The paper contributes to the current state of the art by proposing an approach that considers security concerns as an integral part of the entire system development process and by relating this approach with existing work. The different stages of the approach are described with the aid of a case study; a health and social care information system.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    L. Chung, B. Nixon, “Dealing with Non-Functional Requirements: Three Experimental Studies of a Process-Oriented Approach”, Proceedings of the 17th International Conference on Software Engineering, Seattle-USA, 1995Google Scholar
  2. 2.
    I. Sommerville, “Software Engineering”, sixth edition, Addison-Wesley, 2001Google Scholar
  3. 3.
    E. Yu, L. Cysneiros, “Designing for Privacy and Other Competing Requirements”, 2nd Symposium on Requirements Engineering for Information Security (SREIS’ 02), Raleigh, North Carolina, 15–16 November, 2002Google Scholar
  4. 4.
    A. Dardenne, A. Van Lamsweerde, S. Fickas, “Goal-directed Requirements Acquisition. Science of Computer Programming”, Special issue on 6 th Int. Workshop of Software Specification and Design, 1991.Google Scholar
  5. 5.
    B. Lampson, “Computer Security in the real world”, Annual Computer Security Applications Conference 2000.Google Scholar
  6. 6.
    J. McDermott, C. Fox, “Using Abuse Care Models for Security Requirements Analysis”, Proceedings of the 15th Annual Computer Security Applications Conference, December 1999.Google Scholar
  7. 7.
    R. Anderson, “Security Engineering: A Guide to Building Dependable Distributed Systems”, Wiley Computer Publishing, 2001Google Scholar
  8. 8.
    W. Stallings, “Cryptography and Network Security: Principles and Practice”, Second Edition, Prentice-Hall 1999.Google Scholar
  9. 9.
    T. Tryfonas, E. Kiountouzis, A. Poulymenakou. “Embedding security practices in contemporary information systems development approaches”, Information Management & Computer Security, Vol 9 Issue 4, 2001, pp 183–197CrossRefGoogle Scholar
  10. 10.
    J. Castro, M. Kolp and J. Mylopoulos. “A Requirements-Driven Development Methodology,” In Proc. of the 13th Int. Conf. On Advanced Information Systems Engineering (CAiSE’01), Interlaken, Switzerland, June 2001.Google Scholar
  11. 11.
    A. Perini, P. Bresciani, P. Giorgini, F. Giunchiglia, J. Mylopoulos. “Towards an Agent Oriented Approach to Software Engineering. In A. Omicini and M. Viroli, editors, WOA 2001 — Dagli oggetti agli agenti: tendenze evolutive dei sistemi software, Modena-Italy, September 2001.Google Scholar
  12. 12.
    P. Bresciani and P. Giorgini. “The Tropos Analysis Process as Graph Transformation System”. In Proceedings of the Workshop on Agent-oriented methodologies, at OOPSLA 2002, Seattle, WA, USA, Nov, 2002.Google Scholar
  13. 13.
    E. Yu, “Modelling Strategic Relationships for Process Reengineering”, PhD thesis, Department of Computer Science, University of Toronto, Canada, 1995.Google Scholar
  14. 14.
    H. Mouratidis, P. Giorgini, G. Manson, I. Philp, “A Natural Extension of Tropos Methodology for Modelling Security”, In the Proceedings of the Agent Oriented Methodologies Workshop (OOPSLA 2002), Seattle-USA, November 2002.Google Scholar
  15. 15.
    B. Bauer, J. Müller, J. Odell, “Agent UML: A Formalism for Specifying Multiagent Interaction”. In Agent-Oriented Software Engineering, Paolo Ciancarini and Michael Wooldridge (eds), Springer, Berlin, pp. 91–103, 2001.CrossRefGoogle Scholar
  16. 16.
    H. Mouratidis, i. Philp, G. Manson, “Analysis and Design of eSAP: An Integrated Health and Social Care Information System”, in the Proceedings of the 7th International Symposium on Health Information Managements Research (ISHIMR2002), Sheffield, June 2002Google Scholar
  17. 17.
    M. Garzetti, P. Giorgini, J. Mylopoulos, F. Sannicolo, “Applying Tropos Methodology to a real case study: Complexity and Criticality Analysis”, in the Proceedings of the Second Italian workshop on “WOA 2002 dagli oggetti agli agenti dall’informazione alla conoscenza”, Milano, 18–19 November 2002Google Scholar
  18. 18.
    P. Giorgini, J. Mylopoulos, E. Nicchiarelli, R. Sebastiani. “Reasoning with Goal Models”, in the Proceedings of the 21st International Conference on Conceptual Modeling (ER2002), Tampere, Finland, October 2002.Google Scholar
  19. 19.
    L. Bass, P. Clements, R. Kazman, “Software Architecture in Practice”, SEI Series in Software Engineering, Addison-Wesley, 1998.Google Scholar
  20. 20.
    J. Bosch, “Design and Use of Software Architectures: adopting and evolving a product-line approach”, ACM Press, Addison-Wesley, 2000.Google Scholar
  21. 21.
    R. T. Fielding, “Architectural Styles and the Design of Network-based Software Architectures”, Doctoral dissertation, University of California, Irvine, 2000Google Scholar
  22. 22.
    A. Puliafito, S. Riccobene, M. Scarpa, “Which paradigm should I use?: An analytical comparison of the client-server, remote evaluation and mobile agents paradigms”, IEEE Concurrency and Computation: Practice & Experience, vol. 13, pp. 71–94, 2001.MATHCrossRefGoogle Scholar
  23. 23.
    Kotz, D.; Mattern, F. (Eds.): Agent Systems, Mobile Agents, and Applications. Proceedings of the Second International Symposium on Agent Systems and Applications and Fourth International Symposium on Mobile Agents, ASA/MA 2000, pp. 57–72. LNCS 1882, Springer-Verlag, 2000Google Scholar
  24. 24.
    R. Kazman, G. Abowd, L. Bass, M. Webb, “SAAM: A Method for Analyzing the Properties of Software Architectures”, Proceedings of ICSE-16, Sorrento — Italy, May, 1994.Google Scholar
  25. 25.
    H. Mouratidis, P. Giorgini, G. Manson, I. Philp, “Using Tropos Methodology to Model an Integrated Health Assessment System”, Proceedings of the 4th International Bi-Conference Workshop on Agent-Oriented Information Systems (AOIS-2002), Toronto-Ontario, May 2002Google Scholar
  26. 26.
    C. Meadows, “A Model of Computation for the NRL protocol analyser”, Proceedings of the 1994 Computer Security Foundations Workshop, 1994.Google Scholar
  27. 27.
    S. Rohrig, “Using Process Models to Analyze Health Care Security Requirements”, International Conference Advances in Infrastructure for e-Business, e-Education, e-Science, and e-Medicine on the Internet, January 2002, L’Aquila, ItalyGoogle Scholar
  28. 28.
    L. Liu, E. Yu, J. Mylopoulos, “Analysing Security Requirements as Relationships Among Strategic Actors”, 2nd Symposium on Requirements Engineering for Information Security (SREIS’02). Raleigh, North Carolina, October 16, 2002.Google Scholar
  29. 29.
    Dardenne, A. van Lamsweerde, S. Fickas, “Goal-directed Requirements Acquisition. Science of Computer Programming”, Special issue on 6 th Int. Workshop of Software Specification and Design, 1991.Google Scholar
  30. 30.
    Jan Jürjens, “Towards Secure Systems Development with UMLsec”, Fundamental Approaches to Software Engineering (FASE/ETAPS) 2001, International Conference, Genoa 4–6 April 2001Google Scholar
  31. 31.
    T. Lodderstedt, D. Basin, J. Doser, “SecureUML: A UML-Based Modelling Language for Model-Driven Security”, in the Proceedings of the 5th International Conference on the Unified Modeling Language, 2002.Google Scholar
  32. 32.
    S. Guttorm, A. L. Opdahl, “Eliciting Security Requirements by Misuse Cases”, Proceedings of TOOLS Pacific 2000, November 2000.Google Scholar
  33. 33.
    A. Fuxman, M. Pistore, J. Mylopoulos, P. Traverso, “Model Checking Early Requirements Specification in Tropos”, Proceedings of the 5th Int. Symposium on Requirements Engineering, RE’ 01, Toronto, Canada, August 2001Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Haralambos Mouratidis
    • 1
  • Paolo Giorgini
    • 2
  • Gordon Manson
    • 1
  1. 1.Department of Computer ScienceUniversity of SheffieldEngland
  2. 2.Department of Information and Communication TechnologyUniversity of TrentoItaly

Personalised recommendations