<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">SecTro: A CASE Tool for Modelling Security in Requirements Engineering using Secure Tropos</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Michalis</forename><surname>Pavlidis</surname></persName>
							<email>m.pavlidis@ieee.org</email>
							<affiliation key="aff0">
								<orgName type="department">School of Computing, IT and Engineering</orgName>
								<orgName type="institution">University of East London</orgName>
								<address>
									<country key="GB">UK</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Shareeful</forename><surname>Islam</surname></persName>
							<email>shareeful@uel.ac.uk</email>
							<affiliation key="aff0">
								<orgName type="department">School of Computing, IT and Engineering</orgName>
								<orgName type="institution">University of East London</orgName>
								<address>
									<country key="GB">UK</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">SecTro: A CASE Tool for Modelling Security in Requirements Engineering using Secure Tropos</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">256FE2A38EDE4DD63AB4E1E0A5091924</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T03:23+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Security</term>
					<term>goal modelling</term>
					<term>requirements engineering</term>
					<term>Secure Tropos</term>
					<term>CASE tools</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Secure Tropos is an extension of Tropos methodology, which considers security throughout the whole development process. The main concept of Secure Tropos is the security constraint that captures constraints regarding security. Similarly, the concepts of dependency, goal, task, resource, and capability were also extended with security in mind. In this paper we present the SecTro tool, a CASE tool that guides and supports the developers in the construction of the appropriate models of Secure Tropos.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>As the use of information systems is increasing rapidly everyday in finance, military, education, health care, and transportation, the need of security is increasing respectively. The stored information in many cases is sensitive and has to be secured by protecting it from any attack. In other words, there should be cost effective and operationally effective protection from undesirable events <ref type="bibr" target="#b0">[1]</ref>.</p><p>It is already agreed by the industry and research community, that security has to be considered from the early phases of the software development process <ref type="bibr" target="#b1">[2]</ref>. Having defined the security requirements along with the functional requirements will enable the better comprehension of the system's security issues and limit the conflicts between the security and functional requirements for more secure information systems <ref type="bibr" target="#b0">[1]</ref>.</p><p>Secure Tropos is a security requirements engineering methodology that considers security throughout the whole development process <ref type="bibr" target="#b0">[1]</ref>. The approach identifies, models and analyses the security issues from the early stages of software development within the organization and social settings <ref type="bibr" target="#b1">[2]</ref>. But, the fact that it considers security from the early stages of software development, results in a serious increase of the activities in the software development stages and therefore requires the existence of a software tool to support the development process <ref type="bibr" target="#b1">[2]</ref>. This paper demonstrates a tool, named SecTro, which assists the security analysts in constructing the relevant Secure Tropos diagrams that are required in order to identify, model and analyze the security issues.</p><p>The rest of the paper is structured as follows. Section 2 is a review on Secure Tropos. Section 3 illustrates the tool that supports Secure Tropos. Section 4 discusses the related work while section 5 concludes the paper and presents future work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Secure Tropos Methodology</head><p>Secure Tropos is an extension of Tropos methodology that takes security into account and is based on the concept of security constraint. Also, the Tropos concepts of dependency, goal, task, resource, and capability were also extended with security in mind and formed the secure entities <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b2">3]</ref>. Secure Tropos includes the following modelling activities, the security reference modelling, the security constraint modelling, the secure entities modelling, and the secure capability modelling. In addition, it consists of four stages, the early requirements, the late requirements, the architectural design, and the detailed design stages. The metamodel of Secure Tropos <ref type="bibr" target="#b3">[4]</ref> is shown in Fig. <ref type="figure" target="#fig_0">1</ref> and for a more detailed description of Secure Tropos please refer to <ref type="bibr" target="#b0">[1]</ref>, <ref type="bibr" target="#b2">[3]</ref>. 3 The SecTro Tool</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">SecTro Architecture</head><p>SecTro is a standalone application that was built with the Java programming language making it a portable application across different platforms. The package diagram is shown in Fig. <ref type="figure" target="#fig_1">2</ref> and descriptions of the packages are given in Table <ref type="table">1</ref>. The class diagram of the classes that are responsible for the drawing functionality of the tool is shown in Fig. <ref type="figure">3</ref>. In the ElementType class belong all the elements that can be drawn, such as an actor and a hard goal, and in the LinkType class belong all the links between the elements, such as the "plays" link and the "satisfies" link. The class diagram of the graphical user interface (GUI) package is shown in Fig. <ref type="figure">4</ref>.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">SecTro Layout and Functionalities</head><p>SecTro's workspace (Fig. <ref type="figure" target="#fig_3">5</ref>) consists of the drawing canvas in the centre, on the top there is a series of tabs for showing the developed diagrams for each stage of Secure Tropos, the project explorer and the properties panel are on the right side, the toolbox (Fig. <ref type="figure" target="#fig_4">6</ref>) is on the left side, and the SecTro assistant at the bottom of the workspace. The graphical representations of all the concepts of Secure Tropos by the SecTro tool are shown in Fig. <ref type="figure" target="#fig_5">7</ref> and the graphical representation of the secure dependency is shown in Fig. <ref type="figure" target="#fig_6">8</ref>.    The main functionalities of the SecTro are to support the developer in the modelling activities of Secure Tropos. Therefore, the tool enables the developer to perform security reference modelling (Fig. <ref type="figure" target="#fig_7">9</ref>), security constraint modelling (Fig. <ref type="figure" target="#fig_8">10</ref>), secure entities modelling (Fig. <ref type="figure" target="#fig_9">11</ref>), and secure capability modelling. During these activities the tool has a mechanism for checking the rules and constraints and informs the developer for any error. Also, the SecTro assistant panel shows more information about the rules and constrains, the concepts and the meta-models. In this way it assists the developer in the learning process of Secure Tropos methodology. Furthermore, the tool enables the developer to export the diagrams as images and in XML format.   During the architectural design the architecture of the system is defined. The tool can automatically generate the architecture style and the system decomposition. However, the activities of the architectural design can be a very difficult task for a developer without knowledge of security. Finally, in most cases, during the end of the architectural design the security attack testing takes places, where the design of the system is tested against the security requirements <ref type="bibr" target="#b4">[5]</ref>. The tool automatically generates for the developer the security attack scenario template and the security test case template.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Related Work</head><p>Although Secure Tropos is still in research and it is difficult to develop a CASE tool for a methodology that is still in research, the i* modelling framework has been out for some years and a number of related CASE tools were developed to support it. OME <ref type="bibr" target="#b5">[6]</ref>, OpenOME <ref type="bibr" target="#b6">[7]</ref>, REDEPEND-REACT <ref type="bibr" target="#b7">[8]</ref>, TAOM4e <ref type="bibr" target="#b8">[9]</ref>, GR-Tool <ref type="bibr" target="#b9">[10]</ref>, T-Tool <ref type="bibr" target="#b8">[9]</ref>, ST-Tool <ref type="bibr" target="#b10">[11]</ref>, J-PRiM <ref type="bibr" target="#b11">[12]</ref>, jUCMNav <ref type="bibr" target="#b12">[13]</ref>, SNet Tool <ref type="bibr" target="#b13">[14]</ref>, and DesCARTES <ref type="bibr">[15]</ref> are some examples of such tools.</p><p>The aforementioned tools, although they were developed for different ultimate purposes, they all provide support for the i* modelling framework, which is the modelling framework that was adopted by Secure Tropos as well. But, Secure Tropos introduces new concepts that none of the previous tools enables their graphical representation, i.e. security constraint, secure goal, secure plan, secure resource, and secure capability. Also, the previous tools don't provide support for the modelling activities that Secure Tropos introduces, i.e. security constraint modelling, secure entities modelling, and secure capability modelling. So, despite the fact that experienced users with Secure Tropos can make conventions and use the previous tools to construct single diagrams; these tools are not adequate to support the Secure Tropos methodology.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusions and Future Work</head><p>The tool supports the developers in the modelling activities of the early and late requirements and architectural design stages of Secure Tropos by assisting them in the construction of the relevant concepts and models that are required during the new modelling activities. Its user-friendly interface makes it easy to use and assists security analysts who are not familiar with the methodology, by providing them with information about the methodology concepts, stages, and metamodels. Also, it enforces rules and constraints and provides valuable feedback on various actions of the developers in an interactive way. The tool has already been used by the students of university of East London to model and analyse security issues of a real industry case study. However, the tool does not support the modelling activities of the detailed design stage and we consider this as future work. In addition, future work includes the extension of the XML Schema in order to validate more models of the methodology.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig.1. Secure Tropos metamodel.</figDesc><graphic coords="2,126.81,363.56,345.85,297.65" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Package diagram of SecTro.</figDesc><graphic coords="3,215.41,300.37,177.93,198.07" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Table 1 .Fig. 3 .Fig. 4 .</head><label>134</label><figDesc>Fig. 3. Class diagram of the SecTro drawing functionality.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Fig. 5 .</head><label>5</label><figDesc>Fig. 5. SecTro workspace.</figDesc><graphic coords="5,126.81,147.58,340.35,186.33" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Fig. 6 .</head><label>6</label><figDesc>Fig. 6. SecTro toolbox.</figDesc><graphic coords="5,155.74,559.95,286.11,51.67" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Fig. 7 .</head><label>7</label><figDesc>Fig. 7. Secure Tropos notation.</figDesc><graphic coords="5,313.74,426.16,59.19,118.01" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Fig. 8 .</head><label>8</label><figDesc>Fig. 8. Secure Dependency.</figDesc><graphic coords="5,159.69,629.89,278.08,51.42" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Fig. 9 .</head><label>9</label><figDesc>Fig. 9. Security reference modelling.</figDesc><graphic coords="6,191.36,416.64,215.13,72.04" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Fig. 10 .</head><label>10</label><figDesc>Fig. 10. Security constraint modelling.</figDesc><graphic coords="6,210.74,516.94,176.04,160.13" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head>Fig. 11 .</head><label>11</label><figDesc>Fig. 11. Secure entities modelling.</figDesc></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_0">Pre-proceedings of CAISE'11 Forum   </note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Secure Tropos: A Security-Oriented Extension of the Tropos Methodology</title>
		<author>
			<persName><forename type="first">H</forename><surname>Mouratidis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Giorgini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Software Engineering and Knowledge Engineering</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="285" to="309" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Integrating Security and Software Engineering: Future Vision and Challenges</title>
		<author>
			<persName><forename type="first">H</forename><surname>Mouratidis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Giorgini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Integrating Security and Software Engineering: Advances and Future Visions</title>
				<editor>
			<persName><forename type="first">H</forename><surname>Mouratidis</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Giorgini</surname></persName>
		</editor>
		<meeting><address><addrLine>London</addrLine></address></meeting>
		<imprint>
			<publisher>Idea Group Publishing</publisher>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Modelling Security and Trust with Secure Tropos</title>
		<author>
			<persName><forename type="first">P</forename><surname>Giorgini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Mouratidis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Zannone</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Integrating Security and Software Engineering: Advances and Future Visions</title>
				<editor>
			<persName><forename type="first">H</forename><surname>Mouratidis</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Giorgini</surname></persName>
		</editor>
		<meeting><address><addrLine>London</addrLine></address></meeting>
		<imprint>
			<publisher>Idea Group Publishing</publisher>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">Summary of Secure Tropos Metamodel</title>
		<author>
			<persName><forename type="first">R</forename><surname>Matulevicious</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
		<respStmt>
			<orgName>University of Namur</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Internal Report</note>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Security Attack Testing (SAT) -Testing the Security of Information Systems at Design Time</title>
		<author>
			<persName><forename type="first">H</forename><surname>Mouratidis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Giorgini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Information Systems</title>
		<imprint>
			<biblScope unit="volume">32</biblScope>
			<biblScope unit="page" from="1166" to="1183" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title/>
		<author>
			<persName><surname>Ome3</surname></persName>
		</author>
		<ptr target="http://www.cs.toronto.edu/km/ome/" />
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title/>
		<author>
			<persName><surname>Openome</surname></persName>
		</author>
		<ptr target="https://se.cs.toronto.edu/trac/ome/" />
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">REDEPEND-REACT: An Architecture Analysis Tool</title>
		<author>
			<persName><forename type="first">G</forename><surname>Grau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Franch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Maiden</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">13 th IEEE International Conference on Requirements Engineering</title>
				<meeting><address><addrLine>Paris</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="455" to="456" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Tool-supported Development with Tropos: The Conference Management System Case Study</title>
		<author>
			<persName><forename type="first">M</forename><surname>Morandini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">D</forename><surname>Nguyen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Perini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Siena</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Susi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">AOSE 2007. LNCS</title>
				<editor>
			<persName><forename type="first">M</forename><surname>Luck</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Padgham</surname></persName>
		</editor>
		<meeting><address><addrLine>Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="volume">4951</biblScope>
			<biblScope unit="page" from="182" to="196" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Goal-Oriented Requirements Analysis and Reasoning in Tropos Methodology</title>
		<author>
			<persName><forename type="first">P</forename><surname>Giorgini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mylopoulos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Sebastiani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Engineering Applications of Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="159" to="171" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Computer-Aided Support for Secure Tropos</title>
		<author>
			<persName><forename type="first">F</forename><surname>Massaci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mylopoulos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Zanone</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Automated Software Engineering</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="341" to="364" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">J-PRiM: A Java Tool for a Process Reengineering i* Methodology</title>
		<author>
			<persName><forename type="first">G</forename><surname>Grau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Franch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Avila</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">14 th IEEE International Conference on Requirements Engineering</title>
				<meeting><address><addrLine>Minneapolis</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2006">2006</date>
			<biblScope unit="page" from="359" to="360" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Assessing the Applicability of Use Case Maps for Business Process and Workflow Description</title>
		<author>
			<persName><forename type="first">G</forename><surname>Mussbacher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Amyot</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2008 International MCETECH Conference on e-Technologies</title>
				<meeting><address><addrLine>Montreal</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="219" to="222" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">SNet: A Modeling and Simulation Environment for Agent Networks Based on i* and ConGolog</title>
		<author>
			<persName><forename type="first">G</forename><surname>Gans</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Lakemeyer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Jarke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Vits</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 14th International Conference on Advanced Information Systems Engineering</title>
				<meeting>the 14th International Conference on Advanced Information Systems Engineering</meeting>
		<imprint>
			<date type="published" when="2002">2002</date>
			<biblScope unit="page" from="328" to="323" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
