Skip to main content

Security Patterns Meet Agent Oriented Software Engineering: A Complementary Solution for Developing Secure Information Systems

  • Conference paper
Conceptual Modeling – ER 2005 (ER 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3716))

Included in the following conference series:

Abstract

Agent Oriented Software Engineering and security patterns have been proposed as suitable paradigms for the development of secure information systems. However, so far, the proposed solutions are focused on one of these paradigms. In this paper we propose an agent oriented security pattern language and we discuss how it can be used together with the Tropos methodology to develop secure information systems. We also present a formalisation of our pattern language using Formal Tropos. This allows us to gain a deeper understanding of the patterns and their relationships, and thus to assess the completeness of the language.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alexander, C., Ishikawa, S., Silverstein, M.: A Pattern Language: Towns, Buildings, Constructions. Oxford University Press, Oxford (1977)

    Google Scholar 

  2. Amoroso, E.: Fundamentals of Computer Security Technology. Prentice-Hall, Englewood Cliffs (1994)

    MATH  Google Scholar 

  3. Bresciani, P., Giorgini, P., Giunchiglia, F., Mylopoulos, J., Perini, A.: TROPOS: An Agent Oriented Software Development Methodology. Journal of Autonomous Agents and Multi-Agent Systems 8(3), 203–236 (2004)

    Article  Google Scholar 

  4. Jürjens, J.: UMLsec: Extending UML for Secure Systems Development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412–425. Springer, Heidelberg (2002)

    Google Scholar 

  5. Dardenne, A., van Lamsweerde, A., Fickas, S.: Goal-directed Requirements Acquisition. In: Science of Computer Programming, Special issue on the 6th International Workshop of Software Specification and Design (1991)

    Google Scholar 

  6. Fernandez, E., Pan, R.: A Pattern Language for Security Models. In: Conference on Patterns Languages of Programs, PLoP (2001)

    Google Scholar 

  7. Fuxman, A.: Formal Analysis of Early Requirements Specifications, MSc thesis, University of Toronto, Canada (2001)

    Google Scholar 

  8. Liu, L., Yu, E., Mylopoulos, J.: Analyzing Security Requirements as Relationships Among Strategic Actors. In: Symposium on Requirements Engineering for Information Security, SREIS (2002)

    Google Scholar 

  9. Mouratidis, H., Giorgini, P., Weiss, M.: Integrating Patterns and Agent-Oriented Methodologies to Provide Better Solutions for the Development of Secure Agent Systems, Hot Topic on the Expressiveness of Pattern Languages. In: ChiliPloP (2003)

    Google Scholar 

  10. Mouratidis, H., Giorgini, P., Manson, G.: When Security meets Software Engineering: A Case of Modelling Secure Information Systems. Information Systems (in press)

    Google Scholar 

  11. Noble, J.: Classifying Relationships between Object-Oriented Design Patterns. In: Australian Software Engineering Conference, ASWEC (1998)

    Google Scholar 

  12. Saltzer, J., Schroeder, M.: The Protection of Information in Computer Systems. Proceedings of the IEEE 63(9), 1278–1308 (1975)

    Article  Google Scholar 

  13. Schumacher, M.: Security Engineering with Patterns. LNCS, vol. 2754. Springer, Heidelberg (2003)

    Book  MATH  Google Scholar 

  14. Tryfonas, T., Kiountouzis, E., Poulymenakou, A.: Embedding Security Practices in Contemporary Information Systems Development Approaches. Information Management & Computer Security 9(4), 183–197 (2001)

    Article  Google Scholar 

  15. Weiss, M.: Pattern Driven Design of Agent Systems: Approach and Case Study. In: Eder, J., Missikoff, M. (eds.) CAiSE 2003. LNCS, vol. 2681. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  16. Yoder, J., Barcalow, J.: Architectural Patterns for Enabling Application Security. In: Conference on Pattern Languages of Programs, PLoP (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mouratidis, H., Weiss, M., Giorgini, P. (2005). Security Patterns Meet Agent Oriented Software Engineering: A Complementary Solution for Developing Secure Information Systems. In: Delcambre, L., Kop, C., Mayr, H.C., Mylopoulos, J., Pastor, O. (eds) Conceptual Modeling – ER 2005. ER 2005. Lecture Notes in Computer Science, vol 3716. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11568322_15

Download citation

  • DOI: https://doi.org/10.1007/11568322_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29389-7

  • Online ISBN: 978-3-540-32068-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics