A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
Many approaches for modelling security requirements have been proposed,but software industry did not reach on an agreement on how to express security requirements in a system model for software architecture. The main objective of this perspective paper is to summarize the problem space of representa...
Main Authors: | , , , , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
IEEE Explore
2018
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/68117/ http://irep.iium.edu.my/68117/ http://irep.iium.edu.my/68117/1/68117_A%20Methodology%20for%20Modelling%20and%20Analysis%20of%20Secure%20Systems.pdf http://irep.iium.edu.my/68117/7/68117_A%20methodology%20for%20modelling%20and%20analysis%20of%20secure%20systems_SCOPUS.pdf |
id |
iium-68117 |
---|---|
recordtype |
eprints |
spelling |
iium-681172019-03-01T06:11:50Z http://irep.iium.edu.my/68117/ A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases Maher, Zulfikar Ahmad Shah, Asadullah Shaikh, Humaiz Rahu, Ghulam Ali Butt, Pinial Khan Chandio, Shahmurad Shaikh, Saima T10.5 Communication of technical information Many approaches for modelling security requirements have been proposed,but software industry did not reach on an agreement on how to express security requirements in a system model for software architecture. The main objective of this perspective paper is to summarize the problem space of representation of security patterns are proposed in the literature to help the developers who lack expertise in security to implement it. Applications of security patterns has been hindered by the fact that they lack directions for their implementations in a specific scenario. This paper presents a techniques for using mitigation use cases for representation solution provided by security patterns. Different challenges and issues were identified related to the application of security patterns in industry. IEEE Explore 2018 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/68117/1/68117_A%20Methodology%20for%20Modelling%20and%20Analysis%20of%20Secure%20Systems.pdf application/pdf en http://irep.iium.edu.my/68117/7/68117_A%20methodology%20for%20modelling%20and%20analysis%20of%20secure%20systems_SCOPUS.pdf Maher, Zulfikar Ahmad and Shah, Asadullah and Shaikh, Humaiz and Rahu, Ghulam Ali and Butt, Pinial Khan and Chandio, Shahmurad and Shaikh, Saima (2018) A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases. In: 7th International Conference on Computer and Communication Engineering (ICCCE) 2018, 19th-20th September 2018, Kuala Lumpur. 10.1109/ICCCE.2018.8539339 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English English |
topic |
T10.5 Communication of technical information |
spellingShingle |
T10.5 Communication of technical information Maher, Zulfikar Ahmad Shah, Asadullah Shaikh, Humaiz Rahu, Ghulam Ali Butt, Pinial Khan Chandio, Shahmurad Shaikh, Saima A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases |
description |
Many approaches for modelling security requirements have been proposed,but software industry did not reach on an agreement on how to express security requirements in a system model for software architecture. The main objective of this perspective paper is to summarize the problem space of representation of security patterns are proposed in the literature to help the developers who lack expertise in security to implement it. Applications of security patterns has been hindered by the fact that they lack directions for their implementations in a specific scenario. This paper presents a techniques for using mitigation use cases for representation solution provided by security patterns. Different challenges and issues were identified related to the application of security patterns in industry. |
format |
Conference or Workshop Item |
author |
Maher, Zulfikar Ahmad Shah, Asadullah Shaikh, Humaiz Rahu, Ghulam Ali Butt, Pinial Khan Chandio, Shahmurad Shaikh, Saima |
author_facet |
Maher, Zulfikar Ahmad Shah, Asadullah Shaikh, Humaiz Rahu, Ghulam Ali Butt, Pinial Khan Chandio, Shahmurad Shaikh, Saima |
author_sort |
Maher, Zulfikar Ahmad |
title |
A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases |
title_short |
A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases |
title_full |
A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases |
title_fullStr |
A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases |
title_full_unstemmed |
A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases |
title_sort |
methodology for modelling and analysis of secure systems using security patterns and mitigation use cases |
publisher |
IEEE Explore |
publishDate |
2018 |
url |
http://irep.iium.edu.my/68117/ http://irep.iium.edu.my/68117/ http://irep.iium.edu.my/68117/1/68117_A%20Methodology%20for%20Modelling%20and%20Analysis%20of%20Secure%20Systems.pdf http://irep.iium.edu.my/68117/7/68117_A%20methodology%20for%20modelling%20and%20analysis%20of%20secure%20systems_SCOPUS.pdf |
first_indexed |
2023-09-18T21:36:41Z |
last_indexed |
2023-09-18T21:36:41Z |
_version_ |
1777412867422683136 |