Eliciting Security Requirements for Business Processes of Legacy Systems

被引:6
|
作者
Argyropoulos, Nikolaos [1 ]
Marquez Alcaniz, Luis [2 ]
Mouratidis, Haralambos [1 ]
Fish, Andrew [1 ]
Rosado, David G. [3 ]
Garcia-Rodriguez de Guzman, Ignacio [3 ]
Fernandez-Medina, Eduardo [3 ]
机构
[1] Univ Brighton, Watts Bldg,Lewes Rd, Brighton BN2 4GJ, E Sussex, England
[2] Spanish Natl Author Markets & Competit CNMC, Madrid, Spain
[3] Univ Castilla La Mancha, E-13071 Ciudad Real, Spain
关键词
Legacy systems; Business process modelling; Goal-oriented security requirements; Secure Tropos; BPMN; MARBLE; INFORMATION-SYSTEMS; MANAGEMENT; DESIGN; MODELS;
D O I
10.1007/978-3-319-25897-3_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The modernisation of enterprise legacy systems, without compromises in their functionality, is a demanding and time consuming endeavour. To retain the underlying business behaviour during their modernisation, the MARBLE TM framework has been developed for the extraction of business process models from their source code. Building on top of that work, in this paper we propose an integrated approach for transforming the extracted legacy process models into Secure Tropos goal models. Such models facilitate the elicitation of security requirements in a high level of abstraction, which are then incorporated back into the process models of the modernised systems as security features. Therefore high level models can be derived from legacy source code with minimal manual intervention, where security can be elaborated by nontechnical stakeholders in alignment with organisational objectives.
引用
收藏
页码:91 / 107
页数:17
相关论文
共 50 条
  • [11] Eliciting security requirements with misuse cases
    Guttorm Sindre
    Andreas L. Opdahl
    Requirements Engineering, 2005, 10 : 34 - 44
  • [12] Eliciting security requirements with misuse cases
    Sindre, G
    Opdahl, AL
    REQUIREMENTS ENGINEERING, 2005, 10 (01) : 34 - 44
  • [13] Eliciting Security Requirements - An Experience Report
    Trentinaglia, Roman
    Merschjohann, Sven
    Fockel, Markus
    Eikerling, Hendrik
    REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY, REFSQ 2023, 2023, 13975 : 351 - 365
  • [14] Eliciting security requirements by misuse cases
    Sindre, G
    Opdahl, AL
    37TH INTERNATIONAL CONFERENCE ON TECHNOLOGY OF OBJECT-ORIENTED LANGUAGES AND SYSTEMS, PROCEEDINGS, 2000, : 120 - 143
  • [15] Introducing Security Access Control Policies into Legacy Business Processes
    Giraldo, Faber D.
    Blay-Fornarino, Mireille
    Mosser, Sebastien
    2011 15TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOC 2011), 2011, : 42 - 49
  • [16] Modeling and Utilizing Security Knowledge for Eliciting Security Requirements
    Abe, Tatsuya
    Hayashi, Shinpei
    Saeki, Motoshi
    ADVANCES IN CONCEPTUAL MODELING, ER 2015 WORKSHOPS, 2015, 9382 : 236 - 247
  • [17] Eliciting security requirements through misuse activities
    Braz, Fabricio A.
    Ferriandez, Eduardo B.
    VanHilst, Michael
    DEXA 2008: 19TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2008, : 328 - +
  • [18] Eliciting Usable Security Requirements with Misusability Cases
    Faily, Shamal
    Flechais, Ivan
    2011 19TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2011, : 339 - 340
  • [19] Discovering Business Processes in Legacy Systems using Business Rules and Log Mining
    do Nascimento, Gleison S.
    Iochpe, Cirano
    Thom, Lucineia
    Kalsing, Andre C.
    do Nascimento, Gleison S.
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2013, : 207 - 212
  • [20] A Top Down Approach for Eliciting Systems Security Requirements for a Notional Autonomous Space System
    Mailloux, Logan O.
    Span, Martin 'Trae'
    Mills, Robert F.
    Young, William Bill
    2019 13TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2019,