CFP last date
20 January 2025
Reseach Article

Use Case Application in Requirements Analysis using Secure Tropos to UMLsec - Security Issues

by Mohammad Nazmul Alam, Sohrab Hossain, Kazy Noor E Alam Siddiquee
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 109 - Number 4
Year of Publication: 2015
Authors: Mohammad Nazmul Alam, Sohrab Hossain, Kazy Noor E Alam Siddiquee
10.5120/19177-0651

Mohammad Nazmul Alam, Sohrab Hossain, Kazy Noor E Alam Siddiquee . Use Case Application in Requirements Analysis using Secure Tropos to UMLsec - Security Issues. International Journal of Computer Applications. 109, 4 ( January 2015), 21-25. DOI=10.5120/19177-0651

@article{ 10.5120/19177-0651,
author = { Mohammad Nazmul Alam, Sohrab Hossain, Kazy Noor E Alam Siddiquee },
title = { Use Case Application in Requirements Analysis using Secure Tropos to UMLsec - Security Issues },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 109 },
number = { 4 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 21-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume109/number4/19177-0651/ },
doi = { 10.5120/19177-0651 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:43:53.601539+05:30
%A Mohammad Nazmul Alam
%A Sohrab Hossain
%A Kazy Noor E Alam Siddiquee
%T Use Case Application in Requirements Analysis using Secure Tropos to UMLsec - Security Issues
%J International Journal of Computer Applications
%@ 0975-8887
%V 109
%N 4
%P 21-25
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information Systems Security is one of the most critical challenges presently facing nearly every one of the organizations. However, making certain security and quality in both information and the systems which control information is a difficult goal necessitating the mixture of two wide research disciplines which are typically separate: security engineering and secure software engineering. Security engineering has an extensive history, and has focused generally on providing advances in security models, techniques and protocols, but it remains in a steady state of the development. Secure software engineering, however, has emerged relatively recently, but is growing quickly and is paying attention on the integration of security into software engineering techniques; models and processes, in order to build up more secure information systems. The main aim of this paper is to show the requirements analysis using Secure Tropos to Umlsec. Secure tropos is a security oriented extension of tropos methodology and UMLsec is a security oriented extension of standard UML model. To do this we identify different transformation rules and we apply these rules by identifying different steps. We use kent Modeling Transformation Language as a Transformation Language to transform the secure tropos model to UMLsec model and then finally we use a case study to exemplify these rules.

References
  1. R. Anderson, ''Security Engineering-A Guide to Building Dependable Distributed Systems'', John Wiley & Sons, New York, NY. 2001
  2. H. Mouratidis and P. Giorgini (eds), ''Integrating Security and Software Engineering: Advances and Future Vision'', Idea group, IGI Publishing Group, 2006.
  3. A. Jacobsson, ''Privacy and Security in Internet-based Information Systems'', Bleking Institute of technology, Sweden,Doctoral Dissertation Series No. 2008:02, 2008.
  4. Yu, E. , K, ''Modeling strategic relationship for process reengineering'', PhD Thesis, University of Toronto, 1996
  5. Terry Quatrani, ''Visual Modeling with Rational Rose 2002 and UML'', Addison-Wesley, 2004.
  6. Jan Jürjens, ''Secure Systems Development with UML'', Springer publishing, 2003.
  7. ''Meta Object Facility (MOF) 2. 0 Query/View/Transformation Specification'', 2008, http://www. omg. org/spec/QVT/1. 0/PDF
  8. Sebastien Demathieu, Catherine Griffin, Shane Sendall, (2005)''Model Transformation with the IBM Model Transformation Framwork''Level: Intermediate
  9. Mouratidis, H; Jürjens, J; Fox, J. , ''towards a comprehensive framework for secure systems development'', in: Dubois, E; Pohl, K. (Eds) CAiSE 2006, LNCS 4001 pp 48-62.
  10. Jan Jürjens (contributing P. Shabalin, S. Höhn, S. Meng) ''Secure Enterprise Applications with UML'' Software & Systems Engineering Informatics, TU Munich, Germany, 2003
  11. secure tropos website: http://securetropos. org/
  12. D. H Akehurst,et al. ''Kent Model Transformation Language'',University of Kent,Canterbury,2006
Index Terms

Computer Science
Information Sciences

Keywords

Use Case UMLsec Tropos Actor Goal.