Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and mastercard

49Citations
Citations of this article
55Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Computer Security is one of today's hot topic and the need for conceptual models of security features have brought up a number of proposals ranging from UML extensions to novel conceptual models. What is still missing, however, are models that focus on high-level security requirements, without forcing the modeler to immediately get down to security mechanisms. The modeling process itself should make it clear why encryption, authentication or access control are necessary, and what are the tradeoffs, if they are selected. In this paper we show that the i*/Tropos framework lacks the ability to capture these essential features and needs to be augmented. To motivate our proposal, we build upon a substantial case study - the modeling of the Secure Electronic Transactions e-commerce suites by VISA and MasterCard - to identify missing modeling features. In a nutshell, the key missing concept is the separation of the notion of offering a service (of a handling data, performing a task or fulfilling a goal) and ownership of the very same service. This separation is what makes security essential. The ability of the methodology to model a clear dependency relation between those offering a service (the merchant processing a credit card number), those requesting the service (the bank debiting the payment), and those owning the very same data (the cardholder), make security solutions emerge as a natural consequence of the modeling process. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Giorgini, P., Massacci, F., & Mylopoulos, J. (2003). Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and mastercard. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2813, 263–276. https://doi.org/10.1007/978-3-540-39648-2_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free