sentation of security constraints is Secure Tropos
(Mouratidis and Giorgini, 2007). The Tropos method-
ology aims to model security concerns throughout
the whole development process. The Secure Tro-
pos paradigm is based on agent-oriented software
engineering and centers around the concepts of ac-
tors, their goals, obligations, capabilities, security
constraints, and dependencies. The notation used
is based on UML, and constraints can be formally
expressed (and verified) with the Object Constraint
Language (OCL) (Object Management Group, 2014).
The stakeholder and security requirements identifica-
tion used in Secure Tropos is another option that could
be used in my approach, but its applicability has not
yet been tested.
In addition to the already mentioned policy frame-
works, there are various other policy languages for
the specification of machine-readable policies, for ex-
ample the Ponder language (Damianou et al., 2001),
SSPL (Al-Morsy and Faheem, 2009) or Rei (Kagal
et al., 2003). For a brief overview of available policy
languages, see (De Coi and Olmedilla, 2008; World
Wide Web Consortium, 2012).
ACKNOWLEDGEMENTS
The research presented in this paper is supported
by the German Ministry of Education and Research
projects Software Campus (grant number 01IS12053)
and Software-Cluster SINNODIUM (grant number
01IC12S01F) as well as by the European Commis-
sion in the context of the Research Framework Pro-
gram Seven (FP7) project SECCRIT (Grant Agree-
ment No. 312758). The sole responsibility for the
content of this document lies with the author.
REFERENCES
Al-Morsy, M. and Faheem, H. (2009). A new standard secu-
rity policy language. Potentials, IEEE, 28(2):19–26.
Alexander, I. (2003). Misuse cases: use cases with hostile
intent. Software, IEEE, 20(1):58–66.
Chadwick, D. W. and Otenko, A. (2003). The permis x. 509
role based privilege management infrastructure. Fu-
ture Generation Computer Systems, 19(2):277–289.
Common Criteria Maintenance Board (2012). Common
Criteria for Information Technology Security Evalua-
tion, CCv3.1 Revision 4 (CCMB-2012-09-001, -002,
-003). http://www.commoncriteriaportal.org/cc/.
Damianou, N., Dulay, N., Lupu, E., and Sloman, M. (2001).
The ponder policy specification language. In Slo-
man, M., Lupu, E., and Lobo, J., editors, Policies
for Distributed Systems and Networks, volume 1995
of Lecture Notes in Computer Science, pages 18–38.
Springer Berlin Heidelberg.
De Coi, J. L. and Olmedilla, D. (2008). A review of trust
management, security and privacy policy languages.
In SECRYPT, pages 483–490. Citeseer.
German Bundesamt f
¨
ur Sicherheit in der Information-
stechnik (2005). BSI: IT-Grundschutz Catalogues.
https://www.bsi.bund.de/EN/Topics/ITGrundschutz/
itgrundschutz.html (a more recent ver-
sion from 2013 in German is available at
https://www.bsi.bund.de/DE/Themen/ITGrundschutz
/itgrundschutz node.html).
Gutmann, P. and Grigg, I. (2005). Security usability. Secu-
rity Privacy, IEEE, 3(4):56–58.
Institute for Human & Machine Cognition (2013).
KAoS Policy Services Framework: User Guide.
http://ontology.ihmc.us/KAoS/KAoSUsersGuide.pdf.
Kagal, L., Finin, T., and Joshi, A. (2003). A policy language
for a pervasive computing environment. In Policies
for Distributed Systems and Networks, 2003. Proceed-
ings. POLICY 2003. IEEE 4th International Workshop
on, pages 63–74.
Karat, J., Karat, C.-M., Bertino, E., Li, N., Ni, Q., Brodie,
C., Lobo, J., Calo, S. B., Cranor, L. F., Kumaraguru,
P., and Reeder, R. W. (2009). Policy framework for
security and privacy management. IBM J. Res. Dev.,
53(2):242–255.
Liu, Y., Gummadi, K. P., Krishnamurthy, B., and Mislove,
A. (2011). Analyzing facebook privacy settings: User
expectations vs. reality. In Proceedings of the 2011
ACM SIGCOMM conference on Internet measurement
conference, pages 61–70.
McGraw, G. (2006). Software security: building security
in, volume 1. Addison-Wesley Professional.
Mead, N. R., Hough, E., and Jr., T. R. S. (2005). Se-
curity Quality Requirements Engineering (SQUARE)
Methodology. Technical Report CMU/SEI-2005-TR-
009, Software Engineering Institute, Carnegie Mellon
University, Pittsburgh, PA.
Mouratidis, H. and Giorgini, P. (2007). Secure tropos: A
security-oriented extension of the tropos methodol-
ogy. International Journal of Software Engineering
and Knowledge Engineering, 17(02):285–309.
Object Management Group (2014). Object Constraint Lan-
guage (OCL). http://www.omg.org/spec/OCL/.
Rudolph, M., Schwarz, R., and Jung, C. (2014). Security
policy specification templates for critical infrastruc-
ture services in the cloud. (in press).
Smith, P., Busby, J., Langer, L., Sch
¨
oller, M., and
Shirazi, N. (2013). SECCRIT Deliverable D3.1
Methodology for Risk Assessment and Management.
https://seccrit.eu/publications/publicreports.
Tenerowicz, C. L. (2008). Elicitation Techniques.
https://confluence.cornell.edu/display/BAF/Elicitation
+Techniques.
University of Kent (2011). Permis.
http://sec.cs.kent.ac.uk/permis/index.shtml.
U.S. Computer Emergency Response Team (2007).
SQUARE - Requirements Engineering for Improved
System Security.
User-friendlyandTailoredPolicyAdministrationPoints
11