IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 5    
Website: http://www.ijser.org
scirp IJSER >> Volume 3,Issue 5,May 2012
Comparison between Secure Tropos and VOSREP
Full Text(PDF, )  PP.81-88  
Chandana das, Pardeep kumar Sharma, Kritika Chaudhry
Secure Tropos, VOSREP, Functional and non-functional Requirement, Security Requirement, Threats.
Security is the main concern now days for any software system. In the past security was often treated as an add-on on other requirements, which make the system expensive on both the developer and user sides. Computer system security attacks are one of the most urgent problems facing IT professionals today. Security engineering should be integrated with the Software development life cycle to handle all the issue related to the software security. There are various techniques for addressing security requirements during the early phases of Software Development Life Cycle (SDLC).In this paper we are comparing two existing technique Secure Tropos and VOSREP with the help of example medical information system.
[1] Gupta D., Agarwal A., "Security Requirement Elicitation using view points for online system", International Conference on Emerging Trends in Engineering and Technology, Nagpur, July 2008.

[2] Gupta D., Agarwal A., "Guidelines and case study for eliciting Security Requirements", Proceedings of the 2nd National Conference on Computing for Nation Development, Delhi , pages - 445 – 448.

[3] Ashish Agarwal A., “View Point Approach For Engineering Security Requirements” Department of Computer Engineering, Delhi College of Engineering, University of Delhi, 2008.

[4].Shruti Jaiswal,” Security Requirement Prioritization” Department of Computer Engineering ,Delhi College of Engineering ,University of Delhi,2009.

[5] Haralambos Mouratidis, Paolo Giorgini, Gordon Manson, Ian Philp,”A Natural Extension of Tropos Methodology for Modelling Security”, 2002.

[6] Donald G. Firesmith, “Engineering Security Requirements”, Journal of object technology, 2003, vol 2, no.1, pages 53-68.

[7] Donald G. Firesmith, “Engineering Security Requirements”, Journal of object technology, 2003, vol 2, no.1, pages 53-68.

[8]Haralambosn Mouratidis ,” Secure Tropos: A Security-Oriented Extesion of the Tropos Methodology”, International Journal of Software Engineering and Knowledge Engineering World Scientific Publishing Company.2007

[9] “Secure Tropos: dealing effectively with security requirements in the development of multiagent systems”, H. Mouratidis, P. Giorgini,School of Computing and Technology, University of East London, England, Department of Information and Communication Technology, University of Trento, Italy..2006

[10] Sindre G, Opdahl AL, “Eliciting security requirements by misuse cases”. In proceeding of IEEE conference, 2000.

[13] Dan Wu, “Security Functional Requirements Analysis For Developing Secure Software”, 2007.

Untitled Page