Implementing Security Requirements through Automatic Generation of Secure Workflows
dc.contributor.advisor | Liaskos, Sotirios | |
dc.contributor.author | Jaouhar, Ibrahim | |
dc.date.accessioned | 2022-08-08T15:51:24Z | |
dc.date.available | 2022-08-08T15:51:24Z | |
dc.date.copyright | 2022-03-14 | |
dc.date.issued | 2022-08-08 | |
dc.date.updated | 2022-08-08T15:51:23Z | |
dc.degree.discipline | Information Systems and Technology | |
dc.degree.level | Master's | |
dc.degree.name | MA - Master of Arts | |
dc.description.abstract | Modern software-intensive information systems are enormously large and complex. Prior to the design process of such systems, designers and architects need to know what kinds of stakeholder needs the system is supposed to support. This is particularly true for security requirements which must be captured and analyzed alongside all other requirements rather than treated as an afterthought. Hence, many researchers have proposed different modelling frameworks in different domain fields to address security and privacy patterns. However, most of these frameworks focus on comprehensive representation and analysis of requirements, without indicating how such requirements can be implemented within the context of a business process. Users are often at loss with regards to what security technologies they should adopt and incorporate in their workflows to reach secure business processes. In this thesis, we propose a framework for enriching goal-oriented requirements models with security controls necessitated by specified security requirements. A set of patterns are designed by security experts that associate abstract domain-independent user goals/tasks with alternative workflows that achieve those goals with various levels of security. Such translation of information is performed with the aid of an AI planner, SHOP2. Consequently, system analysts with no deep experience in security technologies can acquire a view of what steps and technologies are involved in making their designs more secure and implement accordingly. | |
dc.identifier.uri | http://hdl.handle.net/10315/39619 | |
dc.language | en | |
dc.rights | Author owns copyright, except where explicitly noted. Please contact the author directly with licensing requests. | |
dc.subject | Artificial intelligence | |
dc.subject.keywords | Goal modelling | |
dc.subject.keywords | Requirements engineering | |
dc.subject.keywords | Artificial intelligence | |
dc.subject.keywords | Requirements analysis | |
dc.subject.keywords | Security patterns | |
dc.subject.keywords | iStar. | |
dc.title | Implementing Security Requirements through Automatic Generation of Secure Workflows | |
dc.type | Electronic Thesis or Dissertation |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Jaouhar_Ibrahim_2022_Masters.pdf
- Size:
- 2.11 MB
- Format:
- Adobe Portable Document Format