Advertisement

Requirement Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard

  • Paolo Giorgini
  • Fabio Massacci
  • John Mylopoulos
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2813)

Abstract

Computer Security is one of today’s hot topic and the need for conceptual models of security features have brought up a number of proposals ranging from UML extensions to novel conceptual models. What is still missing, however, are models that focus on high-level security requirements, without forcing the modeler to immediately get down to security mechanisms. The modeling process itself should make it clear why encryption, authentication or access control are necessary, and what are the tradeoffs, if they are selected. In this paper we show that the i*/Tropos framework lacks the ability to capture these essential features and needs to be augmented. To motivate our proposal, we build upon a substantial case study – the modeling of the Secure Electronic Transactions e-commerce suites by VISA and MasterCard – to identify missing modeling features. In a nutshell, the key missing concept is the separation of the notion of offering a service (of a handling data, performing a task or fulfilling a goal) and ownership of the very same service. This separation is what makes security essential. The ability of the methodology to model a clear dependency relation between those offering a service (the merchant processing a credit card number), those requesting the service (the bank debiting the payment), and those owning the very same data (the cardholder), make security solutions emerge as a natural consequence of the modeling process.

Keywords

Credit Card Trust Relationship Credit Card Number Electronic Payment System Secure Electronic Transaction 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Anderson, R.: Security Engineering – a Guide to Building Dependable Distributed Systems. Wiley and Sons, Chichester (2003)Google Scholar
  2. 2.
    Bella, G., Massacci, F., Paulson, L.C.: The verification of an industrial payment protocol: The SET purchase phase. In: Atluri, V. (ed.) 9th ACM Conference on Computer and Communications Security, pp. 12–20. ACM Press, New York (2002)CrossRefGoogle Scholar
  3. 3.
    Bella, G., Massacci, F., Paulson, L.C.: Verifying the SET registration protocols. IEEE Journal on Selected Areas on Communications 21(1) (2003) (in press)Google Scholar
  4. 4.
    Castro, J., Kolp, M., Mylopoulos, J.: Towards Requirements-Driven Information Systems Engineering: The Tropos Project. In: Information Systems. Elsevier, Amsterdam (2003) (to appear)Google Scholar
  5. 5.
    Devambu, P.T., Stubbelbine, S.: Software engineering for security: a roadmap. In: Future of Software Engineering. The proceedings of the 22nd International Conference on Software Engineering (ICSE 2000), pp. 227–239 (2000)Google Scholar
  6. 6.
    Jézéquel, J.-M., Hußmann, H., Cook, S. (eds.): UML 2002. LNCS, vol. 2460. Springer, Heidelberg (2002)zbMATHGoogle Scholar
  7. 7.
    Jézéquel, J.-M., Hußmann, H., Cook, S. (eds.): SecureUML: A UML-Based Modeling Language for Model-Driven Security. LNCS, vol. 2460. Springer, Heidelberg (2002)Google Scholar
  8. 8.
    Jürjens, J.: Modelling audit security for smart-card payment schemes with UMLsec. In: 16th International Conference on Information Security (IFIP/SEC 2001). Kluwer, AP (2001)Google Scholar
  9. 9.
    Jürjens, J.: Towards secure systems development with umlsec. In: Hussmann, H. (ed.) FASE 2001. LNCS, vol. 2029, p. 187. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  10. 10.
    Jürjens, J.: UMLsec: Extending UML for secure systems development. In: Jézéquel et al. [6]Google Scholar
  11. 11.
    Jürjens, J.: Using UMLsec and Goal-Trees for secure systems development. In: Symposium of Applied Computing (SAC 2002). ACM Press, New York (2002)Google Scholar
  12. 12.
    Liu, L., Yu, E., Mylopoulos, J.: Analyzing Security Requirements as Relationships Among Strategic Actors. In: Proceedings of the 2nd Symposium on Requirements Engineering for Information Security (SREIS 2002), Raleigh, North Carolina (2002)Google Scholar
  13. 13.
    Lodderstedt, T., Basin, D.A., Doser, J.: Model driven security for processoriented systems. In: 8th ACM Symposium on Access Control Models and Technologies (2003)Google Scholar
  14. 14.
    Mastercard & VISA. SET Secure Electronic Transaction Specification: Business Description (May 1997), Available electronically at http://www.setco.org/set_specifications.html
  15. 15.
    Mastercard & VISA. SET Secure Electronic Transaction Specification: Programmer’s Guide (May 1997), Available electronically at http://www.setco.org/set_specifications.html
  16. 16.
    McGraw, G., Viega, J.: Building Secure Software. Addison Wesley Professional computing (2001)Google Scholar
  17. 17.
    Mouratidis, H., Giorgini, P., Manson, G.: Integrating security and systems engineering: Towards the modelling of secure information systems. In: Eder, J., Missikoff, M. (eds.) CAiSE 2003. LNCS, vol. 2681. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  18. 18.
    Mouratidis, H., Giorgini, P., Manson, G.: Modelling secure multiagent systems. In: Proceedings of the 2nd International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS (2003)Google Scholar
  19. 19.
    O’Mahony, D., Peirce, M., Tewari, H.: Electronic payment systems. The Artech House computer science library. Artech House (1997)Google Scholar
  20. 20.
    Paller, A.: Alert: Large criminal hacker attack on Windows NTE-banking and Ecommerce sites. SANS Institute (March 2001), On the Internet at http://www.sans.org/newlook/alerts/NTE-bank.htm
  21. 21.
    Perini, A., Bresciani, P., Giunchiglia, F., Giorgini, P., Mylopoulos, J.: A Knowledge Level Software Engineering Methodology for Agent Oriented Programming. In: Proc. of the 5th Int. Conference on Autonomous Agents, Montreal CA, May 2001. ACM, New York (2001)Google Scholar
  22. 22.
    Yu, E., Cysneiros, L.: Designing for Privacy and Other Competing Requirements. In: Proceedings of the 2nd Symposium on Requirements Engineering for Information Security (SREIS 2002), Raleigh, North Carolina (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Paolo Giorgini
    • 1
  • Fabio Massacci
    • 1
  • John Mylopoulos
    • 1
    • 2
  1. 1.Department of Information and Communication TechnologyUniversity of TrentoItaly
  2. 2.Deptartment of Computer ScienceUniversity of TorontoCanada

Personalised recommendations