A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases

Many approaches for modelling security requirements have been proposed,but software industry did not reach on an agreement on how to express security requirements in a system model for software architecture. The main objective of this perspective paper is to summarize the problem space of representa...

Full description

Saved in:
Bibliographic Details
Main Authors: Maher, Zulfikar Ahmad, Shah, Asadullah, Shaikh, Humaiz, Rahu, Ghulam Ali, Butt, Pinial Khan, Chandio, Shahmurad, Shaikh, Saima
Format: Conference or Workshop Item
Language:English
English
Published: IEEE Explore 2018
Subjects:
Online Access:http://irep.iium.edu.my/68117/1/68117_A%20Methodology%20for%20Modelling%20and%20Analysis%20of%20Secure%20Systems.pdf
http://irep.iium.edu.my/68117/7/68117_A%20methodology%20for%20modelling%20and%20analysis%20of%20secure%20systems_SCOPUS.pdf
http://irep.iium.edu.my/68117/
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
English
id my.iium.irep.68117
record_format dspace
spelling my.iium.irep.681172019-03-01T06:11:50Z http://irep.iium.edu.my/68117/ A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases Maher, Zulfikar Ahmad Shah, Asadullah Shaikh, Humaiz Rahu, Ghulam Ali Butt, Pinial Khan Chandio, Shahmurad Shaikh, Saima T10.5 Communication of technical information Many approaches for modelling security requirements have been proposed,but software industry did not reach on an agreement on how to express security requirements in a system model for software architecture. The main objective of this perspective paper is to summarize the problem space of representation of security patterns are proposed in the literature to help the developers who lack expertise in security to implement it. Applications of security patterns has been hindered by the fact that they lack directions for their implementations in a specific scenario. This paper presents a techniques for using mitigation use cases for representation solution provided by security patterns. Different challenges and issues were identified related to the application of security patterns in industry. IEEE Explore 2018 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/68117/1/68117_A%20Methodology%20for%20Modelling%20and%20Analysis%20of%20Secure%20Systems.pdf application/pdf en http://irep.iium.edu.my/68117/7/68117_A%20methodology%20for%20modelling%20and%20analysis%20of%20secure%20systems_SCOPUS.pdf Maher, Zulfikar Ahmad and Shah, Asadullah and Shaikh, Humaiz and Rahu, Ghulam Ali and Butt, Pinial Khan and Chandio, Shahmurad and Shaikh, Saima (2018) A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases. In: 7th International Conference on Computer and Communication Engineering (ICCCE) 2018, 19th-20th September 2018, Kuala Lumpur. 10.1109/ICCCE.2018.8539339
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
English
topic T10.5 Communication of technical information
spellingShingle T10.5 Communication of technical information
Maher, Zulfikar Ahmad
Shah, Asadullah
Shaikh, Humaiz
Rahu, Ghulam Ali
Butt, Pinial Khan
Chandio, Shahmurad
Shaikh, Saima
A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
description Many approaches for modelling security requirements have been proposed,but software industry did not reach on an agreement on how to express security requirements in a system model for software architecture. The main objective of this perspective paper is to summarize the problem space of representation of security patterns are proposed in the literature to help the developers who lack expertise in security to implement it. Applications of security patterns has been hindered by the fact that they lack directions for their implementations in a specific scenario. This paper presents a techniques for using mitigation use cases for representation solution provided by security patterns. Different challenges and issues were identified related to the application of security patterns in industry.
format Conference or Workshop Item
author Maher, Zulfikar Ahmad
Shah, Asadullah
Shaikh, Humaiz
Rahu, Ghulam Ali
Butt, Pinial Khan
Chandio, Shahmurad
Shaikh, Saima
author_facet Maher, Zulfikar Ahmad
Shah, Asadullah
Shaikh, Humaiz
Rahu, Ghulam Ali
Butt, Pinial Khan
Chandio, Shahmurad
Shaikh, Saima
author_sort Maher, Zulfikar Ahmad
title A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
title_short A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
title_full A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
title_fullStr A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
title_full_unstemmed A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
title_sort methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
publisher IEEE Explore
publishDate 2018
url http://irep.iium.edu.my/68117/1/68117_A%20Methodology%20for%20Modelling%20and%20Analysis%20of%20Secure%20Systems.pdf
http://irep.iium.edu.my/68117/7/68117_A%20methodology%20for%20modelling%20and%20analysis%20of%20secure%20systems_SCOPUS.pdf
http://irep.iium.edu.my/68117/
_version_ 1643619048625274880