FROM HIPPOCRATIC DATABASES TO SECURE TROPOS: A COMPUTER-AIDED RE-ENGINEERING APPROACH

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach

Privacy protection is a growing concern in the marketplace. Yet, privacy requirements and mechanisms are usually retro-fitted into a pre-existing design which may not be able to accommodate them due to potential conflicts with functional requirements. We propose a procedure for automatically extracting privacy requirements from databases supporting access control mechanisms for personal data (h...

متن کامل

Secure Software Systems Engineering: The Secure Tropos Approach (Invited Paper)

This paper discusses the secure Tropos methodology. This is the first paper in the literature that discusses all the aspects of the methodology as it has evolved over the last 10 years. In particular, the paper discusses the Secure Tropos modeling language, the security aware process of the methodology, and it also introduces the secTro, an automated tool to support the methodology.

متن کامل

Hippocratic Databases

The Hippocratic Oath has guided the conduct of physicians for centuries. Inspired by its tenet of preserving privacy, we argue that future database systems must include responsibility for the privacy of data they manage as a founding tenet. We enunciate the key privacy principles for such Hippocratic database systems. We propose a strawman design for Hippocratic databases, identify the technica...

متن کامل

A Model Transformation from Misuse Cases to Secure Tropos

In current practices security concerns are typically addressed at the design or implementation stages, leaving aside the rationale for security analysis. The reason is that a systematic approach to address security from late development stages to early analysis stages does not exist. This paper presents transformation rules to perform model translation from misuse case diagram to Secure Tropos ...

متن کامل

Intelligent Computer-Aided Engineering

The goal of Intelligent Computer-Aided Engineering (ICAE) is to construct computer programs which capture a signi cant fraction of an engineer's knowledge. Today ICAE systems are a goal, not a reality. This paper attempts to re ne that goal and suggest how to get there. We begin by examining several scenarios of what ICAE systems could be like. Next we describe why ICAE won't directly evolve fr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Software Engineering and Knowledge Engineering

سال: 2007

ISSN: 0218-1940,1793-6403

DOI: 10.1142/s0218194007003239