International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 109 - Number 4 |
Year of Publication: 2015 |
Authors: Mohammad Nazmul Alam, Sohrab Hossain, Kazy Noor E Alam Siddiquee |
10.5120/19177-0651 |
Mohammad Nazmul Alam, Sohrab Hossain, Kazy Noor E Alam Siddiquee . Use Case Application in Requirements Analysis using Secure Tropos to UMLsec - Security Issues. International Journal of Computer Applications. 109, 4 ( January 2015), 21-25. DOI=10.5120/19177-0651
Information Systems Security is one of the most critical challenges presently facing nearly every one of the organizations. However, making certain security and quality in both information and the systems which control information is a difficult goal necessitating the mixture of two wide research disciplines which are typically separate: security engineering and secure software engineering. Security engineering has an extensive history, and has focused generally on providing advances in security models, techniques and protocols, but it remains in a steady state of the development. Secure software engineering, however, has emerged relatively recently, but is growing quickly and is paying attention on the integration of security into software engineering techniques; models and processes, in order to build up more secure information systems. The main aim of this paper is to show the requirements analysis using Secure Tropos to Umlsec. Secure tropos is a security oriented extension of tropos methodology and UMLsec is a security oriented extension of standard UML model. To do this we identify different transformation rules and we apply these rules by identifying different steps. We use kent Modeling Transformation Language as a Transformation Language to transform the secure tropos model to UMLsec model and then finally we use a case study to exemplify these rules.