Abstract
Computer Security is one of today’s hot topic and the need for conceptual models of security features have brought up a number of proposals ranging from UML extensions to novel conceptual models. What is still missing, however, are models that focus on high-level security requirements, without forcing the modeler to immediately get down to security mechanisms. The modeling process itself should make it clear why encryption, authentication or access control are necessary, and what are the tradeoffs, if they are selected. In this paper we show that the i*/Tropos framework lacks the ability to capture these essential features and needs to be augmented. To motivate our proposal, we build upon a substantial case study – the modeling of the Secure Electronic Transactions e-commerce suites by VISA and MasterCard – to identify missing modeling features. In a nutshell, the key missing concept is the separation of the notion of offering a service (of a handling data, performing a task or fulfilling a goal) and ownership of the very same service. This separation is what makes security essential. The ability of the methodology to model a clear dependency relation between those offering a service (the merchant processing a credit card number), those requesting the service (the bank debiting the payment), and those owning the very same data (the cardholder), make security solutions emerge as a natural consequence of the modeling process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, R.: Security Engineering – a Guide to Building Dependable Distributed Systems. Wiley and Sons, Chichester (2003)
Bella, G., Massacci, F., Paulson, L.C.: The verification of an industrial payment protocol: The SET purchase phase. In: Atluri, V. (ed.) 9th ACM Conference on Computer and Communications Security, pp. 12–20. ACM Press, New York (2002)
Bella, G., Massacci, F., Paulson, L.C.: Verifying the SET registration protocols. IEEE Journal on Selected Areas on Communications 21(1) (2003) (in press)
Castro, J., Kolp, M., Mylopoulos, J.: Towards Requirements-Driven Information Systems Engineering: The Tropos Project. In: Information Systems. Elsevier, Amsterdam (2003) (to appear)
Devambu, P.T., Stubbelbine, S.: Software engineering for security: a roadmap. In: Future of Software Engineering. The proceedings of the 22nd International Conference on Software Engineering (ICSE 2000), pp. 227–239 (2000)
Jézéquel, J.-M., Hußmann, H., Cook, S. (eds.): UML 2002. LNCS, vol. 2460. Springer, Heidelberg (2002)
Jézéquel, J.-M., Hußmann, H., Cook, S. (eds.): SecureUML: A UML-Based Modeling Language for Model-Driven Security. LNCS, vol. 2460. Springer, Heidelberg (2002)
Jürjens, J.: Modelling audit security for smart-card payment schemes with UMLsec. In: 16th International Conference on Information Security (IFIP/SEC 2001). Kluwer, AP (2001)
Jürjens, J.: Towards secure systems development with umlsec. In: Hussmann, H. (ed.) FASE 2001. LNCS, vol. 2029, p. 187. Springer, Heidelberg (2001)
Jürjens, J.: UMLsec: Extending UML for secure systems development. In: Jézéquel et al. [6]
Jürjens, J.: Using UMLsec and Goal-Trees for secure systems development. In: Symposium of Applied Computing (SAC 2002). ACM Press, New York (2002)
Liu, L., Yu, E., Mylopoulos, J.: Analyzing Security Requirements as Relationships Among Strategic Actors. In: Proceedings of the 2nd Symposium on Requirements Engineering for Information Security (SREIS 2002), Raleigh, North Carolina (2002)
Lodderstedt, T., Basin, D.A., Doser, J.: Model driven security for processoriented systems. In: 8th ACM Symposium on Access Control Models and Technologies (2003)
Mastercard & VISA. SET Secure Electronic Transaction Specification: Business Description (May 1997), Available electronically at http://www.setco.org/set_specifications.html
Mastercard & VISA. SET Secure Electronic Transaction Specification: Programmer’s Guide (May 1997), Available electronically at http://www.setco.org/set_specifications.html
McGraw, G., Viega, J.: Building Secure Software. Addison Wesley Professional computing (2001)
Mouratidis, H., Giorgini, P., Manson, G.: Integrating security and systems engineering: Towards the modelling of secure information systems. In: Eder, J., Missikoff, M. (eds.) CAiSE 2003. LNCS, vol. 2681. Springer, Heidelberg (2003)
Mouratidis, H., Giorgini, P., Manson, G.: Modelling secure multiagent systems. In: Proceedings of the 2nd International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS (2003)
O’Mahony, D., Peirce, M., Tewari, H.: Electronic payment systems. The Artech House computer science library. Artech House (1997)
Paller, A.: Alert: Large criminal hacker attack on Windows NTE-banking and Ecommerce sites. SANS Institute (March 2001), On the Internet at http://www.sans.org/newlook/alerts/NTE-bank.htm
Perini, A., Bresciani, P., Giunchiglia, F., Giorgini, P., Mylopoulos, J.: A Knowledge Level Software Engineering Methodology for Agent Oriented Programming. In: Proc. of the 5th Int. Conference on Autonomous Agents, Montreal CA, May 2001. ACM, New York (2001)
Yu, E., Cysneiros, L.: Designing for Privacy and Other Competing Requirements. In: Proceedings of the 2nd Symposium on Requirements Engineering for Information Security (SREIS 2002), Raleigh, North Carolina (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Giorgini, P., Massacci, F., Mylopoulos, J. (2003). Requirement Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard. In: Song, IY., Liddle, S.W., Ling, TW., Scheuermann, P. (eds) Conceptual Modeling - ER 2003. ER 2003. Lecture Notes in Computer Science, vol 2813. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39648-2_22
Download citation
DOI: https://doi.org/10.1007/978-3-540-39648-2_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20299-8
Online ISBN: 978-3-540-39648-2
eBook Packages: Springer Book Archive