Implementing Security Requirements through Automatic Generation of Secure Workflows

dc.contributor.advisorLiaskos, Sotirios
dc.contributor.authorJaouhar, Ibrahim
dc.date.accessioned2022-08-08T15:51:24Z
dc.date.available2022-08-08T15:51:24Z
dc.date.copyright2022-03-14
dc.date.issued2022-08-08
dc.date.updated2022-08-08T15:51:23Z
dc.degree.disciplineInformation Systems and Technology
dc.degree.levelMaster's
dc.degree.nameMA - Master of Arts
dc.description.abstractModern software-intensive information systems are enormously large and complex. Prior to the design process of such systems, designers and architects need to know what kinds of stakeholder needs the system is supposed to support. This is particularly true for security requirements which must be captured and analyzed alongside all other requirements rather than treated as an afterthought. Hence, many researchers have proposed different modelling frameworks in different domain fields to address security and privacy patterns. However, most of these frameworks focus on comprehensive representation and analysis of requirements, without indicating how such requirements can be implemented within the context of a business process. Users are often at loss with regards to what security technologies they should adopt and incorporate in their workflows to reach secure business processes. In this thesis, we propose a framework for enriching goal-oriented requirements models with security controls necessitated by specified security requirements. A set of patterns are designed by security experts that associate abstract domain-independent user goals/tasks with alternative workflows that achieve those goals with various levels of security. Such translation of information is performed with the aid of an AI planner, SHOP2. Consequently, system analysts with no deep experience in security technologies can acquire a view of what steps and technologies are involved in making their designs more secure and implement accordingly.
dc.identifier.urihttp://hdl.handle.net/10315/39619
dc.languageen
dc.rightsAuthor owns copyright, except where explicitly noted. Please contact the author directly with licensing requests.
dc.subjectArtificial intelligence
dc.subject.keywordsGoal modelling
dc.subject.keywordsRequirements engineering
dc.subject.keywordsArtificial intelligence
dc.subject.keywordsRequirements analysis
dc.subject.keywordsSecurity patterns
dc.subject.keywordsiStar.
dc.titleImplementing Security Requirements through Automatic Generation of Secure Workflows
dc.typeElectronic Thesis or Dissertation

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Jaouhar_Ibrahim_2022_Masters.pdf
Size:
2.11 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 2 of 2
No Thumbnail Available
Name:
license.txt
Size:
1.87 KB
Format:
Plain Text
Description:
No Thumbnail Available
Name:
YorkU_ETDlicense.txt
Size:
3.39 KB
Format:
Plain Text
Description: