Abstract
Agent Oriented Software Engineering and security patterns have been proposed as suitable paradigms for the development of secure information systems. However, so far, the proposed solutions are focused on one of these paradigms. In this paper we propose an agent oriented security pattern language and we discuss how it can be used together with the Tropos methodology to develop secure information systems. We also present a formalisation of our pattern language using Formal Tropos. This allows us to gain a deeper understanding of the patterns and their relationships, and thus to assess the completeness of the language.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Alexander, C., Ishikawa, S., Silverstein, M.: A Pattern Language: Towns, Buildings, Constructions. Oxford University Press, Oxford (1977)
Amoroso, E.: Fundamentals of Computer Security Technology. Prentice-Hall, Englewood Cliffs (1994)
Bresciani, P., Giorgini, P., Giunchiglia, F., Mylopoulos, J., Perini, A.: TROPOS: An Agent Oriented Software Development Methodology. Journal of Autonomous Agents and Multi-Agent Systems 8(3), 203–236 (2004)
Jürjens, J.: UMLsec: Extending UML for Secure Systems Development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412–425. Springer, Heidelberg (2002)
Dardenne, A., van Lamsweerde, A., Fickas, S.: Goal-directed Requirements Acquisition. In: Science of Computer Programming, Special issue on the 6th International Workshop of Software Specification and Design (1991)
Fernandez, E., Pan, R.: A Pattern Language for Security Models. In: Conference on Patterns Languages of Programs, PLoP (2001)
Fuxman, A.: Formal Analysis of Early Requirements Specifications, MSc thesis, University of Toronto, Canada (2001)
Liu, L., Yu, E., Mylopoulos, J.: Analyzing Security Requirements as Relationships Among Strategic Actors. In: Symposium on Requirements Engineering for Information Security, SREIS (2002)
Mouratidis, H., Giorgini, P., Weiss, M.: Integrating Patterns and Agent-Oriented Methodologies to Provide Better Solutions for the Development of Secure Agent Systems, Hot Topic on the Expressiveness of Pattern Languages. In: ChiliPloP (2003)
Mouratidis, H., Giorgini, P., Manson, G.: When Security meets Software Engineering: A Case of Modelling Secure Information Systems. Information Systems (in press)
Noble, J.: Classifying Relationships between Object-Oriented Design Patterns. In: Australian Software Engineering Conference, ASWEC (1998)
Saltzer, J., Schroeder, M.: The Protection of Information in Computer Systems. Proceedings of the IEEE 63(9), 1278–1308 (1975)
Schumacher, M.: Security Engineering with Patterns. LNCS, vol. 2754. Springer, Heidelberg (2003)
Tryfonas, T., Kiountouzis, E., Poulymenakou, A.: Embedding Security Practices in Contemporary Information Systems Development Approaches. Information Management & Computer Security 9(4), 183–197 (2001)
Weiss, M.: Pattern Driven Design of Agent Systems: Approach and Case Study. In: Eder, J., Missikoff, M. (eds.) CAiSE 2003. LNCS, vol. 2681. Springer, Heidelberg (2003)
Yoder, J., Barcalow, J.: Architectural Patterns for Enabling Application Security. In: Conference on Pattern Languages of Programs, PLoP (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mouratidis, H., Weiss, M., Giorgini, P. (2005). Security Patterns Meet Agent Oriented Software Engineering: A Complementary Solution for Developing Secure Information Systems. In: Delcambre, L., Kop, C., Mayr, H.C., Mylopoulos, J., Pastor, O. (eds) Conceptual Modeling – ER 2005. ER 2005. Lecture Notes in Computer Science, vol 3716. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11568322_15
Download citation
DOI: https://doi.org/10.1007/11568322_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29389-7
Online ISBN: 978-3-540-32068-5
eBook Packages: Computer ScienceComputer Science (R0)