FROM HIPPOCRATIC DATABASES TO SECURE TROPOS: A COMPUTER-AIDED RE-ENGINEERING APPROACH
نویسندگان
چکیده
منابع مشابه
From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach
Privacy protection is a growing concern in the marketplace. Yet, privacy requirements and mechanisms are usually retro-fitted into a pre-existing design which may not be able to accommodate them due to potential conflicts with functional requirements. We propose a procedure for automatically extracting privacy requirements from databases supporting access control mechanisms for personal data (h...
متن کاملSecure Software Systems Engineering: The Secure Tropos Approach (Invited Paper)
This paper discusses the secure Tropos methodology. This is the first paper in the literature that discusses all the aspects of the methodology as it has evolved over the last 10 years. In particular, the paper discusses the Secure Tropos modeling language, the security aware process of the methodology, and it also introduces the secTro, an automated tool to support the methodology.
متن کاملHippocratic Databases
The Hippocratic Oath has guided the conduct of physicians for centuries. Inspired by its tenet of preserving privacy, we argue that future database systems must include responsibility for the privacy of data they manage as a founding tenet. We enunciate the key privacy principles for such Hippocratic database systems. We propose a strawman design for Hippocratic databases, identify the technica...
متن کاملA Model Transformation from Misuse Cases to Secure Tropos
In current practices security concerns are typically addressed at the design or implementation stages, leaving aside the rationale for security analysis. The reason is that a systematic approach to address security from late development stages to early analysis stages does not exist. This paper presents transformation rules to perform model translation from misuse case diagram to Secure Tropos ...
متن کاملIntelligent Computer-Aided Engineering
The goal of Intelligent Computer-Aided Engineering (ICAE) is to construct computer programs which capture a signi cant fraction of an engineer's knowledge. Today ICAE systems are a goal, not a reality. This paper attempts to re ne that goal and suggest how to get there. We begin by examining several scenarios of what ICAE systems could be like. Next we describe why ICAE won't directly evolve fr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Software Engineering and Knowledge Engineering
سال: 2007
ISSN: 0218-1940,1793-6403
DOI: 10.1142/s0218194007003239