Foundations of Security Analysis and Design IV

  • Aldini A
  • Gorrieri R
N/ACitations
Citations of this article
46Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The Governance, Risk, and Compliance (GRC) management process for Information Security is a necessity for any software systems where important information is collected, processed, and used. To this extent, many standards for security managements at operational level exists (e.g., ITIL, ISO27K family etc). What is often missing is a process to govern security at organizational level. In this tutorial, we present a method to analyze and design security controls that capture the organizational setting of the system and where business goals and processes are the main citizen. The SI*-GRC method is a comprehensive method that is composed of i) a modeling framework based on a requirement engineering framework, with some extensions related to security & GRC concerns, such as: trust, permission, risk, and treatment, 2) a analysis process defining systematical steps in analyzing and design security controls, 3) analytical techniques to verify that certain security properties are satisfied and the risk level is acceptable, and at last 4) a CASE tool, namely the SI*Tool to support analysts in using the method. To illustrate this method, we use a running example on e-Health adapted from a real-life process in an hospital partner. © 2011 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Aldini, A., & Gorrieri, R. (2007). Foundations of Security Analysis and Design IV. Lecture Notes in Computer Science. https://doi.org/10.1007/978-3-540-74810-6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free