Modelling E-business Security Requirements: Developer and Client Expectations

نویسندگان

  • Michael N Johnstone
  • Donald C McDermid
  • John R Venable
چکیده

User perceptions of e-business systems’ security are, at best, that such systems are not as secure as more traditional ways of doing business. As security is now considered to be so crucial to e-Business success, the question of how security requirements are identified and how users can become involved in identifying security requirements for their organisation has become all the more important. This paper describes some of the results of an interpretive study into requirements elicitation using the business rules diagram (BRD) method. An interpretive analysis focusing on security provides some understanding of how users can contribute to the process of security requirements specification. In the study, users became active users of the BRD method and diagram in many requirements engineering areas, including security. A model of cognition is proposed that explains the behaviour that resulted during the study. The model posits two distinct modes of reasoning, formal and informal, and shows how movement occurs between the modes as roles and expectations change over time.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Framework to Model a Secure E-Commerce System

The existing information system (IS) developments methods are not met the requirements to resolve the security related IS problems and they fail to provide a successful integration of security and systems engineering during all development process stages. Hence, the security should be considered during the whole software development process and identified with the requirements specification. Th...

متن کامل

Model-based Security Engineering of SOA System Using Security Intent DSL

Currently most of the enterprises are using SOA and web services technologies to build their web information system. They are using MDA principles for design and development of WIS and using UML as a modelling language for business process modelling. Along with the increased connectivity in SOA environment, security risks rise exponentially. Security is not defined during the early phases of de...

متن کامل

Using Enactable Models to Enhance Use Case Descriptions

Many tools developed for process modelling either model client business processes or the software development process itself. In both cases, benefits are to be found by using the model to highlight real process problems either of clients or developers. However, the modelling of client business processes allows a further opportunity for gain, where the intention is to build a system to provide s...

متن کامل

Pragmatic solutions to make E-mail Security work

The concepts for secure e-mail are available for quite some time. Nevertheless only few users have adopted them. The classical concept of end-to-end e-mail security provides maximum theoretical security. But the effort to implement and enforce it at every client has limited the spreading of security and therefore the overall benefit. Centralized e-mail security overcomes this problem. A gateway...

متن کامل

Integrating Security Aspects into Business Process Models (Integration von Sicherheitsaspekten in Geschäftsprozessmodelle)

Modern enterprise systems are often process-driven and, thus, rely heavily on process-aware information systems. In such systems, high-level process-models play an important role both for communicating business requirements between domain experts and system experts as well as basis for the system implementation. Since several years, enterprise system need to fulfil an increasing number of the s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002