Abstract
To close this book, this chapter presents further applications afforded by the CAIRIS platform. We consider new ideas around the role of environments in CAIRIS, examine how the IRIS meta-model can be leveraged to support the modelling of threats and trust expectations in CAIRIS, and how IRIS and CAIRIS realises the idea of “design as code”. I conclude by demonstrating the use of CAIRIS to model both functional and human concerns, and show how CAIRIS models help evaluate research when participants can be difficult to find or reach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The case study example in the paper is based on the earlier desktop version of CAIRIS, but this example can be reproduced on the more recent version of the CAIRIS platform.
References
Jamshidi M. System of systems - innovations for 21st century. In: 2008 IEEE region 10 and the third international conference on industrial and information systems; 2008. p. 6–7.
Ki-Aries D, Dogan H, Faily S, Whittington P, Williams C. From requirements to operation: components for risk assessment in a pervasive system of systems. In: IEEE 25th international requirements engineering conference workshops, RE 2017 workshops, Lisbon, Portugal, September 4–8, 2017; 2017. p. 83–89.
Shostack A. Threat modeling: designing for security. New York: Wiley; 2014.
Zand DE. Trust and managerial problem solving. Adm Sci Q. 1972;17(2):229–39.
Riegelsberger J, Sasse MA, McCarthy JD. The mechanics of trust: a framework for research and design. Int J Hum Comput Stud. 2005;62(3):381–422.
Fléchais I. Designing secure and usable systems. University College London; 2005.
Faily S. Bridging user-centered design and requirements engineering with GRL and persona cases. In: Proceedings of the 5th international i* workshop. CEUR workshop proceedings; 2011. p. 114–119.
Amyot D, Ghanavati S, Horkoff J, Mussbacher G, Peyton L, Yu E. Evaluating goal models within the goal-oriented requirement language. Int J Intell Syst. 2010;25(8):841–77.
Faily S, Fléchais I. Eliciting and visualising trust expectations using persona trust characteristics and goal models. In: Proceedings of the 6th international workshop on social software engineering. SSE 2014. ACM; 2014. p. 17–24.
Faily S, Power D, Fléchais I. Gulfs of expectation: eliciting and verifying differences in trust expectations using personas. J Trust Manag. 2016;3(1):4 Jul.
Hoare CAR. Communicating sequential processes. Englewood Cliffs: Prentice-Hall; 1985.
University of Oxford. FDR website; 2018. https://www.cs.ox.ac.uk/projects/fdr.
Kim G, Behr K, Spafford G. The phoenix project: a novel about IT, DevOps, and helping your business win. IT Revolution Press; 2014.
Gaver WW, Beaver J, Benford S. Ambiguity as a resource for design. In: CHI ’03: proceedings of the SIGCHI conference on Human factors in computing systems. ACM; 2003. p. 233–240.
Wuyts K. Privacy threats in software architecture. Heverlee: KU Leuven; 2015.
Church L, Kreeger MN, Streets M. Introducing usability to the common criteria. In: 9th international common criteria conference; 2008.
Shamal F. NeuroGrid specification exemplar; 2018. https://cairis.org/NeuroGrid.
Shamal F. ACME Water specification exemplar; 2018. https://cairis.org/ACME_Water.
SweetWilliam SL. HMI Pad website; 2013. http://www.sweetwilliamsl.com/hmi-ipad.
Faily S, Iacob C, Field S. Ethical hazards and safeguards in penetration testing. In: Proceedings of the 30th british HCI group annual conference on people and computers: fusion. British Computer Society; 2016.
Parkin S, Fielder A, Ashby A. Pragmatic security: modelling IT security management responsibilities for SME archetypes. In: Proceedings of the 8th ACM CCS international workshop on managing insider security threats. MIST ’16. ACM; 2016. p. 69–80.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Faily, S. (2018). Further Applications of CAIRIS for Usable and Secure Software Design. In: Designing Usable and Secure Software with IRIS and CAIRIS. Springer, Cham. https://doi.org/10.1007/978-3-319-75493-2_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-75493-2_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-75492-5
Online ISBN: 978-3-319-75493-2
eBook Packages: Computer ScienceComputer Science (R0)