
In our case, we know the secure capabilities of the
actors of the system (and therefore we have a more
precise idea of what security measurements our
system has) and we can reason about the security
attacks according to those capabilities.
6 CONCLUSIONS AND FUTURE
WORK
In this paper we have presented results from the
development of a scenario-based approach to test
how a software system under development copes
against potential security attacks.
The introduction of security attack scenarios to
test the system’s response to potential attacks
provides developers the ability to realistically
check how the developed system will react to
possible security attacks. This, in turn, allows
developers to re-consider particular system
functions with respect to security until the system
under development satisfies all the security
requirements.
The presented work is part of our efforts aiming
to extend the Tropos methodology in a degree that
will allow developers to successfully consider
security issues during the whole development
lifecycle of an information system.
Therefore, future work includes the full
integration of the presented technique within the
security oriented process of the Tropos
methodology, and its application to more case
studies in order to further assess its validity.
REFERENCES
Anton, A.I., McCracken W.M., Potts C., 1994. Goal
Decomposition and Scenario Analysis in Business
Process Reengineering, Proceedings of the 6
th
Conference on Advanced Information Systems
(CAiSE-1994), The Netherlands.
Carroll, J.M., Rosson, M.B., 1991. Getting Around the
Task-Artifact Cycle: How to Make Claims and
Design by Scenario, IBM Research Report, Human
Computer Interaction, RC 17908 (75365).
Kosters, G., Pagel, B.U., Winter, M., 1997. Coupling
Use Cases and Class Models, Proceedings of the
BCS-FACS/EROS workshop on "Making Object
Oriented Methods More Rigorous", Imperial
College, London-England.
Lalioti, V., Theodoulidis, C., 1995. Visual Scenarios for
Validation of Requirements Specification,
Proceedings of the 7th International Conference on
Software Engineering and Knowledge Engineering
(SEKE'95), Rochville, Maryland-USA.
Liu, L., Yu, E., Mylopoulos, J., 2002. Analyzing
Security Requirements as Relationships Among
Strategic Actors, Proceedings of the 2
nd
Symposium
on Requirements Engineering for Information
Security (SREIS’02), Raleigh-North Carolina.
Mouratidis, H., 2002. Extending Tropos Methodology to
Accommodate Security, Progress Report, Computer
Science Department, University of Sheffield.
Mouratidis, H., 2003d. Analysis and Design of a
Multiagent System to Deliver the Single Assessment
Process for Older People, RANK Report, Computer
Science Department, University of Sheffield.
Mouratidis, H., Giorgini, P., Manson, G., 2003a.
Integrating Security and Systems Engineering:
Towards the Modelling of Secure Information
Systems, Proceedings of the 15
th
Conference on
Advance Information Systems (CAiSE-2003),
Velden-Austria.
Mouratidis, H., Giorgini, P., Manson, G., 2003b.
Modelling Secure Multiagent Systems, Proceedings
of the 2
nd
International Joint Conference on
Autonomous Agents and Multiagent Systems
(AAMAS-2003), Melbourne-Australia.
Mouratidis, H., Giorgini, P., Manson, G., Gani A., 2003.
Analysing Security Requirements of Information
Systems Using Tropos, Proceedings of the 5
th
International Conference on Enterprise Information
Systems (ICEIS-2003), Angers-France.
Mouratidis, H., Philp, I., Manson, G., 2003c. A Novel
Agent-Based System to Support the Single
Assessment Process of Older People, (to appear)
Journal of Health Informatics.
Potts, C., Takahashi, K., Anton A.I., 1994. Inquiry
Based Requirements Analysis, IEEE Software,
March 1994.
Ryser, J., Glinz, M., 1999. A Practical Approach to
Validating and Testing Software Systems Using
Scenarios, Proceedings of the Third International
Software Quality Week Europe (QWE'99), Brussel-,
Belgium.
Ryser, J., Glinz, M., 2000. SCENT - A Method
Employing Scenarios to Systematically Derive Test
Cases for System Test, Technical Report 2000.03,
Institut für Informatik, University of Zurich.
Schneier, B., 2000. Secrets and Lies: Digital Security in
a Networked World, John Willey and Sons.
Stallings, W., 1999. Cryptography and Network
Security: Principles and Practice, Prentice-Hall,
Second Edition.
Yu, E., 1995. Modelling Strategic Relationships for
Process Reengineering, PhD thesis, Department of
Computer Science, University of Toronto, Canada.
USING SECURITY ATTACK SCENARIOS TO ANALYSE SECURITY DURING INFORMATION SYSTEMS
DESIGN
17