The increasing rates of cyber-attacks have led to the subsequent need to rapidly develop secure information systems (IS). Secure Tropos is an actor and goal-oriented approach to identify security goals and to enable security requirements elicitation. This is achieved by considering system actors, their dependencies and by deriving security constraints that actors need to satisfy. Nevertheless goal-oriented modelling has proven itself to be valid it also contains few shortcomings. One of them is the high granularity of the process, which leads quickly to high complexity models. Security patterns are proven to be reusable solutions that address recurring security problems. In this paper we investigate the integration of a pattern-based security requirements derivation from the Secure Tropos models.
CITATION STYLE
Rrenja, A., & Matulevičius, R. (2015). Pattern-based security requirements derivation from secure tropos models. In Lecture Notes in Business Information Processing (Vol. 235, pp. 59–74). Springer Verlag. https://doi.org/10.1007/978-3-319-25897-3_5
Mendeley helps you to discover research relevant for your work.