Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Mouratidis, Haralambos; Giorgini, Paolo; Manson, Gordon (2004)
Languages: English
Types: Unknown
It has been widely argued in the literature that security concerns should be integrated with software engineering practices. However, only recently work has been initiated towards this direction. Most of this work, however, only considers how security can be analysed during the development lifecycles and not how the security of an information system can be tested during the analysis and design stages. In this paper we present results from the development of a technique, which is based on the use of scenarios, to test the reaction of an information system against potential security attacks.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • Anton, A.I., McCracken W.M., Potts C., 1994. Goal Decomposition and Scenario Analysis in Business Process Reengineering, Proceedings of the 6th Conference on Advanced Information Systems (CAiSE-1994), The Netherlands.
    • Carroll, J.M., Rosson, M.B., 1991. Getting Around the Task-Artifact Cycle: How to Make Claims and Design by Scenario, IBM Research Report, Human Computer Interaction, RC 17908 (75365).
    • Kosters, G., Pagel, B.U., Winter, M., 1997. Coupling Use Cases and Class Models, Proceedings of the BCS-FACS/EROS workshop on "Making Object Oriented Methods More Rigorous", Imperial College, London-England.
    • Lalioti, V., Theodoulidis, C., 1995. Visual Scenarios for Validation of Requirements Specification, Proceedings of the 7th International Conference on Software Engineering and Knowledge Engineering (SEKE'95), Rochville, Maryland-USA.
    • Liu, L., Yu, E., Mylopoulos, J., 2002. Analyzing Security Requirements as Relationships Among Strategic Actors, Proceedings of the 2nd Symposium on Requirements Engineering for Information Security (SREIS'02), Raleigh-North Carolina.
    • Mouratidis, H., 2002. Extending Tropos Methodology to Accommodate Security, Progress Report, Computer Science Department, University of Sheffield.
    • Mouratidis, H., 2003d. Analysis and Design of a Multiagent System to Deliver the Single Assessment Process for Older People, RANK Report, Computer Science Department, University of Sheffield.
    • Mouratidis, H., Giorgini, P., Manson, G., 2003a. Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems, Proceedings of the 15th Conference on Advance Information Systems (CAiSE-2003), Velden-Austria.
    • Mouratidis, H., Giorgini, P., Manson, G., 2003b. Modelling Secure Multiagent Systems, Proceedings of the 2nd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS-2003), Melbourne-Australia.
    • Mouratidis, H., Giorgini, P., Manson, G., Gani A., 2003. Analysing Security Requirements of Information Systems Using Tropos, Proceedings of the 5th International Conference on Enterprise Information Systems (ICEIS-2003), Angers-France.
    • Mouratidis, H., Philp, I., Manson, G., 2003c. A Novel Agent-Based System to Support the Single Assessment Process of Older People, (to appear) Journal of Health Informatics.
    • Potts, C., Takahashi, K., Anton A.I., 1994. Inquiry Based Requirements Analysis, IEEE Software, March 1994.
    • Ryser, J., Glinz, M., 1999. A Practical Approach to Validating and Testing Software Systems Using Scenarios, Proceedings of the Third International Software Quality Week Europe (QWE'99), Brussel-, Belgium.
    • Ryser, J., Glinz, M., 2000. SCENT - A Method Employing Scenarios to Systematically Derive Test Cases for System Test, Technical Report 2000.03, Institut für Informatik, University of Zurich.
    • Schneier, B., 2000. Secrets and Lies: Digital Security in a Networked World, John Willey and Sons.
    • Stallings, W., 1999. Cryptography and Network Security: Principles and Practice, Prentice-Hall, Second Edition.
    • Yu, E., 1995. Modelling Strategic Relationships for Process Reengineering, PhD thesis, Department of Computer Science, University of Toronto, Canada.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article