by the Object Management Group (OMG) (OMG,
2014).
There are commercial initiatives such as Inte-
granova Model Execution System (MES) (Integra-
nova Software Solutions, 2016), which uses the OO-
Method. This method is an MDD method that
has raised the MDA successfully. The OO-Method
uses formal specifications in the OASIS (Pastor and
Molina, 2007) language (open and active specifica-
tion of information systems) to transform conceptual
models to the source code in the organizational do-
main. Although OO-Method gives us a specialized
and continuous approach to the development of soft-
ware (Pastor and Molina, 2007), it not considered se-
curity issues yet. In this sense, Model-Driven Secu-
rity approach can improve OO-Method.
The Model-Driven Security (MDS) is an MDD
approach that focuses on the development of secure
information systems. In turn, there are multiple ef-
forts based on UML profiles for MDS, designed to
handle different aspects of security, such as authen-
tication, integrity, confidentiality, availability, and in
various contexts, such as web applications or con-
trol agents in software infrastructures. These include
the following SecureDWS, Secret, UMLSec, Se-
cureUML, SecureMDD, SecureSOA, AOMSec, Se-
cureWeb and Access Control (Nguyen et al., 2015).
Other security MDA frameworks have also been de-
veloped such as SEMDA (Guan et al., 2014), which
uses re-engineering, decomposition, abstraction and
reverse engineering techniques to obtain models that
improve the security of legacy systems. The interest-
ing thing about SEMDA is the use of an ontology as a
starting point to adopt standards and best practices in
existing systems.
The family of international security standards for
information management is those established by the
International Organization for Standardization (ISO)
and the International Electrotechnical Commission
(IEC). It provides a recognized support to the global
community as the start and the guide to protect the
assets of the organization. Although these stan-
dards have a wide scope in the management of an
organization the documents grouped in the set la-
beled “27000”are those relevant to this work. Thus,
the ISO/IEC 27000 has the definitions of security
concepts that promote the certification actions most
used in companies(The International Organization for
Standardization, 2016).
For instance, the word “Asset”defined by ISO/IEC
frames the meaning to describe things (physical or
virtual products such as information, software, hard-
ware, services, people or intangibles, and reputation)
that have significant value to the organization and are
the target of Threat Agents. On the other hand, the
term “Stakeholder”surrounds the notion of someone
(individual, company or organization) that owns the
valuable assets (Neubauer et al., 2008).
These concepts give origin to the tuple (As-
set, Stakeholder) and the relationship between them.
They establish the security requirements the software
application must comply. Thus, they are also the plat-
form for the following standards or guides.
Therefore, ISO/IEC provides valuable informa-
tion to support an ontological analysis well founded,
since its content lies in a global agreement. It al-
lows the semantics development for a possible for-
mulation of Conceptual Models more accurate (Pastor
and Molina, 2007). They are also part of the ISO/IEC
27001 group of documents that guides the implemen-
tation of an Information Security Management Sys-
tem (ISMS) (The International Organization for Stan-
dardization, 2013a).
The ISO/IEC 27002 promotes a way to estab-
lish safety requirements (The International Organiza-
tion for Standardization, 2013b), as well as ISO/IEC
27003 that establishes the parameters for the ISMS
implementation (The International Organization for
Standardization, 2017). Moreover, ISO/IEC 27003 is
supported by a risk analysis. The ISO/IEC 27005 de-
scribes this kind of risk analysis that pushes the evalu-
ation and monitoring of risk management (The Inter-
national Organization for Standardization, 2011a).
Likewise, the ISO/IEC 27034 (1-7) is available
as a guide for the development of secure software
following the ISMS. It manages risks and miti-
gates threats in the Systems Development Life Cy-
cle (SDLC). The system different execution scenar-
ios have its security guaranteed by prescribing a set
of processes and controls in the SDLC (The Interna-
tional Organization for Standardization, 2011b). Be-
sides, ISO/IEC 27034 agree with the MDD archetype,
because it allows the efforts concentration in the early
stages of software development. Even from the gesta-
tion of information systems, this standard ensures the
efficiency. It makes valuable the use of conceptual
models to obtain an efficient and standardized gener-
ation of software (Pastor and Molina, 2007).
Furthermore, we add to our proposal other per-
spectives works, and norms coexist. Among them
are: the Information Security Management Maturity
Model (ISM3) (Canal, 2006), the Standard of Good
Practice for Information Security (Protection et al.,
2016), the NIST SP 800-14 Principles and Practices
for Securing Information Technology Systems (Beck-
ers, 2015), technical standards as Open Web Appli-
cation Security Project (OWASP) (Commons, 2013),
the good practice frameworks as The Control Objec-
DCENASE 2018 - Doctoral Consortium on Evaluation of Novel Approaches to Software Engineering
12