<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Global Design for Secure Socio-Technical Systems</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>In: A. Editor, B. Coeditor (eds.): Proceedings of the XYZ Workshop</institution>
          ,
          <addr-line>Location, Country, DD-MMM-YYYY, published at</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Tong Li Supervisor: John Mylopoulos, Fabio Massacci University of Trento via Sommarive 14</institution>
          ,
          <addr-line>Povo(TN)</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Socio-Technical Systems (STS) consist of people, software, hardware and organizational units. The pervasiveness and complexity of STSs make security analysis both particularly challenging and especially critical. Traditional security analysis techniques that address security in a piecemeal fashion (e.g. only for software, or only for business processes) are insu cient for addressing global security concerns and have been found often to leave serious STS vulnerabilities untreated. In this proposal, we aim at developing a comprehensive framework that consists of concepts, techniques and tools for designing secure STSs. In our framework, a STS consists of organizational goals and security requirements, businesses and industrial processes through which requirements are satis ed, software applications that support those processes, and system infrastructure that supports both processes and applications. We intend to propose a systematic process to analyze and design each part of the STSs, and nally provide an all-round security design for STSs.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>Copyright c by the paper's authors. Copying permitted only for private and academic purposes.</p>
      <p>Unfortunately, most existing approaches address security requirements in a piecemeal fashion, merely
considering security issues for a particular narrow part, i.e. software, physical infrastructure, or business process. We
argue that the security designs of di erent parts in STSs may in uence each other in certain ways. Currently,
there are no formal approaches to connect all the design concepts in di erent system components and analyze
their mutual impacts. Thus, no systematic, global means are proposed to design fully secure STSs.</p>
      <p>To address this problem, we plan to develop a framework which consists of concepts, processes, and tools
for designing secure socio-technical system by connecting di erent components with each other. This framework
contributes in following aspects: 1) explicitly capture and represent causal relationships among di erent parts of
a system to support the design in each part; 2) propose a systematic process to produce secure designs for each
component | the synthesis of these designs is treated as the system design, which ful lls both organizational
objectives and security requirements; 3) provide a systematic means to handle system changes, while continuously
satisfy both organizational objectives and security requirements.</p>
      <p>In the remaining part of this paper, we summarize the state of the art in Sec. 2, based on which we describe
concrete research topics in Sect. 3. Sect. 4 shows our research approach that deals with the identi ed problems.
Finally, the contribution of our work is summarized in Sect. 6.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related Work</title>
      <p>In this section, we will summarize related work on the topic of system security analysis and design. We are
able to categorize many of these works according to the analytical perspectives they hold. Speci cally, we
consider following four perspectives: organizational settings, business processes, software applications and physical
infrastructure. Work which falls outside of these classi cations are discussed in a separate subsection.</p>
      <p>
        There are a number of research proposals which focus on ensuring security of organizational settings through
modeling interactions among social actors, as well as some social relationships (e.g. trust, delegation,
authorization) [
        <xref ref-type="bibr" rid="ref11 ref15 ref7">15, 7, 11</xref>
        ].
      </p>
      <p>
        Security analysis which focuses on business processes aims to represent the security requirements in business
process models. Analysts can use these requirements to further design secure business processes [
        <xref ref-type="bibr" rid="ref17 ref9">17, 9</xref>
        ].
      </p>
      <p>
        Most security e orts have focused on the technical aspects of software. There are many security analysis
techniques which can represent either security attacks or security requirements, such as Abuse Case [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], Attack
Tree [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. In addition, there has been much investigation into systematic processes for security requirement
engineering. For example, SQUARE [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] and SREP [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Moreover, security design methodologies are used to
align software developments with security requirements, which capture a lot of security domain knowledge.
Examples of security design methodologies include UMLsec [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] and Security Patterns [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
      </p>
      <p>
        Currently, there are few security approaches that focus on the infrastructure domain. Jurjens considers secure
deployments in UMLsec [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] , which address security issues in the physical layer.
      </p>
      <p>
        Mouratidis and Jurjens connect security designs between the organization perspective and the software
perspective by combining Secure Tropos and UMLsec [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. They provide a structured process to translate the results
of organizational security requirements to pertinent software design elements to support secure software
developments. However, they only transfer security requirements from the organization layer to the software layer,
and do not provide feedback in the other direction.
      </p>
      <p>
        Finally, there is another research branch that address human factors in STSs. Tarimo et al. [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] discuss the
importance of security culture in the security analysis of STSs. They exploit the capability of organizational
behavior theory, and explain how security cultures in uence security requirements of STSs. In addition,
Beautement et al. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] argue that system stakeholders do concern with the costs and bene ts introduced by security
mechanisms, and a lot of security breaches arises due to overlooking the intentional factors of human. Thus, they
propose Compliance Budget to understand human behaviors and further address the security balance problem.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Research Problem</title>
      <p>Compared to technically-focused software systems, the socio-technical systems extend their system boundaries
to include several related components, namely organization, business process and infrastructure. Although the
proposed components may overlap with each other to some extent, we use them to ensure security designs cover
all important aspects of STSs. Our work aims at analyzing all these essential components and investigating
connections between them.</p>
      <p>Organization component includes high-level system requirements. The concerns about organizational
settings (e.g. the organizational hierarchies and policies) are considered in this domain.</p>
      <p>Business process component is considered the core part of STSs, as all organizational requirements are met
through business processes, and as business processes provide instructions for both humans and software on
how to work together to achieve speci c goals.</p>
      <p>Software component provides concrete implementations for supporting the business process. In the
meanwhile, it relies on the deployment of infrastructure.</p>
      <p>Physical infrastructure component is the backbone of software applications. The performance of software
applications highly depends on related infrastructures. In addition, they may also play a role in some
activities in the business process.</p>
      <p>Human factors are the major issues in STSs. Instead of addressing human in uences in an independent dimension,
we consider them together with each of the above components. We aim to consider human reactions together
with related system designs, which facilitate understanding human intentions.</p>
      <p>Based on the above components, our work will take the organizational goals and security requirements, which
are in the organization component, as the inputs. While the outputs are a set of designs in the three left
components, which work together to ensure security of the systems. In this sense, we de ne the designs in the
software component as Software Requirement Speci cations(SRS); the designs in business process component
are Business Requirement Speci cations(BRS) and the designs in infrastructure component are Infrastructure
Requirement Speci cations(IRS). Then the synthesis of all these designs is treated as the system speci cation,
which satis es both organizational goals and security requirements. Thus, the design of STS is de ned as:</p>
      <p>System Design = BRS+SRS+IRS
Current studies only take into account one of these parts and leave assumptions on other parts, which may not
be held in the target system. We argue that these three parts of system designs are highly involved with each
other. Without a global view on all the parts, the system under development will be vulnerable.</p>
      <p>As a result, my research problem is summarized as developing a framework of concepts, processes, and tools for
globally designing secure socio-technical systems by synthesizing designs in three di erent components, namely
business process, software and physical infrastructure. Speci cally, there are four research questions need to
be addressed: 1) what are the interrelationships among the above components; 2) how to formally orchestrate
analysis in di erent components to provide global security designs; 3) how to derive secure designs in each
component; 4) how to adapt designs to handle system changes.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Research Approach</title>
      <p>In this section, we propose a research approach, which addresses the security problems in each system component,
in order to derive global secure designs for STSs.
4.1</p>
      <sec id="sec-4-1">
        <title>Concepts of Secure STS</title>
        <p>
          To specify system designs, we apply the following three concepts Requirements (R), Speci cation (S) and Domain
assumption (D), proposed by Zave and Jackson [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]. They have been formalized as follows: D; S ` R. For a
speci c domain this formula implies that the requirements can be satis ed by the speci cations under relevant
domain assumptions. A number of existing works make use of this conceptualization and formalism [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], but
all of them take the machine domain by default. Our work aims to consider each component of STSs as a
single domain. Each of them has its only requirements, domain assumptions, and speci cations. In addition, we
separate SecurityRequirement(SR) from the concept Requirement(R) in order to stress the security analysis
in our research. As a result, the concepts can be represented by the formula D; S ` R; SR. This formula is
further speci ed for each of the proposed components. For instance, Dbp; Sbp ` Rbp; SRbp represent the relevant
concepts in the business process component. We structure the three components in a hierarchical way (Fig.1),
which answers the research question 1.
        </p>
        <p>
          Concretely, as shown in Fig.1, the organizational requirements are imported to the business process domain;
the design of the business process domains specify the requirements for the software domain, as well as the
infrastructure domain; the software domain should support business process, in the meanwhile shed light on the
requirements for the infrastructure domain; nally, the infrastructure domain should support the design in other
two domains. We use Tropos [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ], a goal-based requirement modeling language, to represent requirements in all
the layers. The speci cations in all three layers are represented by BPMN [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ], UML activity diagram and UML
deployment diagram [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] respectively. All of these models will be further extended with related security notations.
In order to explicitly represent the semantics of each concepts, as well as their interrelationships, we aim to
develop a formal ontology with Description Logic to capture all related knowledge (both system development
and security engineering).
Based on the comprehensive ontology we are planning to build, we will further propose an intuitive process to
orchestrate design processes in di erent layers(Fig.1), which address the research question 2. In each layer, its
requirements are in uenced by designs of other layers. In this process framework, analysis is conducted from the
business process layer to the software layer, nally to infrastructure layer. It is worth noting that the proposed
process is not like waterfall model, which is analyzed once for all, but an iterative process that incrementally
addresses system designs. Through these analytical processes, the traceability links between layers could be
derived, which are the key issues for global system designs.
        </p>
        <p>The traceability links are built from speci cations in one layer to requirements in other layers, not to speci
cations in other layers. In this sense, we do not directly impose designs from one layer to another, which indicates
designs in each layer are only subject to requirements of that layer. The bene ts from this separation include:
1) the requirement model plays as the mediator to connect designs in di erent do- mains, which clearly separate
problems and solutions. By using the intermediary requirement model, the many-to-many mapping relationships
between designs that are in di erent layers could be simpli ed as one-to-many relationships, which reduce the
complexity of the design work and increase the adaptability of the system design. 2) By using the goal models
to represent requirements, we can exploit the inherent advantages of the goal-based analytical techniques to
facilitate the design work, such as the analysis of requirement satisfaction and alternative selection. As a result,
this proposed framework could be used not only for developing new systems, but also for developing systems
that are based on legacy systems. If existing designs of a legacy system cannot satisfy requirements imposed by
previous layers, the analysis will backtrack to the previous layers and try to nd another alternative.</p>
        <p>There are six tasks identi ed in the Fig. 1, which outline the process for deriving an all-round system design.
Concretely, the tasks 1,3 and 5 focus on how to derive general requirements and security requirements from upper
layers. To this end, mapping mechanisms among layers will be de ned to assist the derivation of requirements.
The tasks 2,4 and 6 focus on how to derive secure designs that ful ll both general requirements and security
requirements. We intend to carry out risk-based security analysis processes to derive security designs by adopting
security patterns. This general analytical process will be customized for each layer according to their domain
speci c features. By introducing such a design process we satisfy the research question 3.
4.3</p>
      </sec>
      <sec id="sec-4-2">
        <title>Evolution of Secure Design</title>
        <p>Changes are inevitable for most systems, and these changes must be handled in a way that ensures the continued
satisfaction of system requirements. The essence of our work is to combine concepts in multiple layers, based on
which we are able to identify designs in di erent layers which are e ected by change requests.</p>
        <p>
          In front of changed requirements, we will incrementally evolve the system rather than re-design from scratch.
Thus, appropriate strategies should be applied to promote the incremental design process. Referring to the
work[
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. We consider three kinds of approaches, namely minimal e orts, minimal changes and maximal
familiarities.
4.4
        </p>
      </sec>
      <sec id="sec-4-3">
        <title>Approach Illustration</title>
        <p>The expected contribution of this research is providing a systematic means to globally design a secure STS. In
this part, we use a simple example to show the ideal system development process. A smart grid real-time pricing
scenario is used as an example for illustration. Due to the space limitation, we only focus on a particular part of
this example, which is highlighted by dotted rectangles.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Evaluation Plan</title>
      <p>Our framework aims to support the secure system design for socio-technical systems, and it is supposed to provide
an all-around solution within comparatively e cient processes. To ensure the e ectiveness and e ciency of the
proposed framework, we should follow an evaluation methodology to examine the practical value of our work.</p>
      <p>Tool support We are intended to develop a CASE tool, which can support all the steps of our analytical
framework. Enhanced by this tool, the system design process could be done in a semi-automatic way. For the
task 3 and 5, the tool can analyze the designs in upper layers and generate potential requirements, which will be
further con rmed and modi ed by human. For task 2, 4 and 6, the tool will assist the security analysis processes
to derive security design in each layer. In addition, the tool is able to analyze the ripple-e ects of speci c changes.
All the design fragments in uenced by the changes will be presented by the tool, and the customer will take the
nal decisions about which part should be changed.</p>
      <p>Case study We will apply our design methods to a real socio-technical system, such as smart grid and
electrical healthy system. The key point of the case study is to take out the theoretical method from laboratory
to practice in order to check whether it works in reality. To this end, a number of factors need to be considered
during the case study, such as the background of the method adopter, the time span for learning the method,
the help or guide provided by the method designer. We need to exploit the in uential factors as many as possible
to provide an in-depth evaluation for our method. In addition, if it is possible we are planning to compare our
method with other related work on the same case study to examine the advantages and disadvantages of our
method.
6</p>
    </sec>
    <sec id="sec-6">
      <title>Contribution</title>
      <p>In summary, satisfaction of the proposed research goals via execution of the described plans will contribute to
the state of the art by providing:
1. A conceptual multi-layer framework to understand the secure socio-technical system in a comprehensive
way, speci cally to understand the interactions among di erent system components.
2. A methodology to globally design secure socio-technical systems, which satisfy both organizational objectives
and security requirements, either based on an existing system or for a new system. The methodology is
aimed to enable the evolution of system design to manage requested changes, while continuously ful lling
organizational objectives and security requirements.
3. A tool that supports all the analytical steps of the proposed methodology. The tool will allow us to carry
out an evaluation to examine the practical value of our work.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1. Uni ed Modeling Language. http://www.omg.org/spec/UML/2.1.2/,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2. Business Process Modeling Notation. http://www.omg.org/spec/BPMN/2.0/,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>A.</given-names>
            <surname>Beautement</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Sasse</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Wonham</surname>
          </string-name>
          .
          <article-title>The compliance budget: managing security behaviour in organisations</article-title>
          .
          <source>In Proceedings of the 2008 workshop on New security paradigms</source>
          ,
          <source>NSPW '08</source>
          , pages
          <fpage>47</fpage>
          {
          <fpage>58</fpage>
          , New York, NY, USA,
          <year>2008</year>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>R. P.</given-names>
            <surname>Bostrom</surname>
          </string-name>
          and
          <string-name>
            <given-names>J. S.</given-names>
            <surname>Heinen</surname>
          </string-name>
          .
          <article-title>STS Perspective MIS Problems and Failures : A Socio-Technical Perspective PART I : THE CAUSES</article-title>
          .
          <source>MIS Quarterly</source>
          ,
          <volume>1</volume>
          (
          <issue>3</issue>
          ):
          <volume>17</volume>
          {
          <fpage>32</fpage>
          ,
          <year>1977</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>P.</given-names>
            <surname>Bresciani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Perini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Giorgini</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Giunchiglia</surname>
          </string-name>
          . Tropos:
          <article-title>An agent-oriented software development methodology</article-title>
          .
          <source>Agents and Multi-Agent</source>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>N. A.</given-names>
            <surname>Ernst</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Borgida</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and I.</given-names>
            <surname>Jureta</surname>
          </string-name>
          .
          <article-title>Finding incremental solutions for evolving requirements</article-title>
          .
          <source>Proceedings of 19th IEEE International Requirements Engineering Conference (RE)</source>
          ,
          <volume>0</volume>
          :
          <fpage>15</fpage>
          {
          <fpage>24</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>P.</given-names>
            <surname>Giorgini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Massacci</surname>
          </string-name>
          , and
          <string-name>
            <given-names>N.</given-names>
            <surname>Zannone</surname>
          </string-name>
          .
          <article-title>Security and trust requirements engineering</article-title>
          .
          <source>In Foundations of Security Analysis and Design III</source>
          , volume
          <volume>3655</volume>
          of Lecture Notes in Computer Science, pages
          <volume>237</volume>
          {
          <fpage>272</fpage>
          .
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>C.</given-names>
            <surname>Haley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Laney</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.</surname>
          </string-name>
          <article-title>Mo ett, and</article-title>
          <string-name>
            <given-names>B.</given-names>
            <surname>Nuseibeh</surname>
          </string-name>
          .
          <article-title>Security requirements engineering: A framework for representation and analysis</article-title>
          .
          <source>Software Engineering</source>
          , IEEE Transactions on,
          <volume>34</volume>
          (
          <issue>1</issue>
          ):
          <volume>133</volume>
          {
          <fpage>153</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>P.</given-names>
            <surname>Herrmann</surname>
          </string-name>
          and
          <string-name>
            <given-names>G.</given-names>
            <surname>Herrmann</surname>
          </string-name>
          .
          <article-title>Security requirement analysis of business processes</article-title>
          .
          <source>Electronic Commerce Research</source>
          ,
          <volume>6</volume>
          (
          <issue>3</issue>
          -4):
          <volume>305</volume>
          {
          <fpage>335</fpage>
          ,
          <string-name>
            <surname>Oct</surname>
          </string-name>
          .
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>J. Ju</surname>
          </string-name>
          <article-title>rjens. UMLsec: Extending UML for Secure Systems Development</article-title>
          .
          <source>In Proceedings of the 5th International Conference on The Uni ed Modeling Language</source>
          , volume
          <volume>2460</volume>
          of Lecture Notes in Computer Science, pages
          <volume>412</volume>
          {
          <fpage>425</fpage>
          .
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. L.
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Yu</surname>
            , and
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Mylopoulos</surname>
          </string-name>
          .
          <article-title>Security and privacy requirements analysis within a social setting</article-title>
          .
          <source>In Proceedings IEEE international conference on requirements engineering (RE'03)</source>
          , volume
          <volume>3</volume>
          , pages
          <fpage>151</fpage>
          {
          <fpage>161</fpage>
          ,
          <string-name>
            <surname>Monterey</surname>
          </string-name>
          , California,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>J. McDermott</surname>
            and
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Fox</surname>
          </string-name>
          .
          <article-title>Using abuse case models for security requirements analysis</article-title>
          .
          <source>In 15th Annual Computer Security Applications Conference</source>
          , (ACSAC'99)
          <string-name>
            <surname>Proceedings</surname>
          </string-name>
          ., pages
          <volume>55</volume>
          {
          <fpage>64</fpage>
          . IEEE,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>N. R.</given-names>
            <surname>Mead</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Stehney</surname>
          </string-name>
          .
          <article-title>Security quality requirements engineering (SQUARE) methodology</article-title>
          .
          <source>ACM SIGSOFT Software Engineering Notes</source>
          ,
          <volume>30</volume>
          (
          <issue>4</issue>
          ):
          <fpage>1</fpage>
          ,
          <string-name>
            <surname>July</surname>
          </string-name>
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>D.</given-names>
            <surname>Mellado</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Fernandez-Medina</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Piattini</surname>
          </string-name>
          .
          <article-title>A common criteria based security requirements engineering process for the development of secure information systems</article-title>
          .
          <source>Computer Standards &amp; Interfaces</source>
          ,
          <volume>29</volume>
          (
          <issue>2</issue>
          ):
          <volume>244</volume>
          {
          <fpage>253</fpage>
          ,
          <string-name>
            <surname>Feb</surname>
          </string-name>
          .
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>H.</given-names>
            <surname>Mouratidis</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Giorgini</surname>
          </string-name>
          .
          <article-title>A natural extension of tropos methodology for modelling security</article-title>
          .
          <source>In the Proceedings of the Agent Oriented Methodologies Workshop (OOPSLA</source>
          <year>2002</year>
          ), Seattle-USA,,
          <year>2002</year>
          . Citeseer.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <given-names>H.</given-names>
            <surname>Mouratidis</surname>
          </string-name>
          and
          <string-name>
            <given-names>J. Jurjens. From</given-names>
            <surname>Goal-Driven Security</surname>
          </string-name>
          Requirements Engineering to Secure Design.
          <source>International Journal of Intelligent System</source>
          ,
          <volume>25</volume>
          (
          <issue>8</issue>
          ):
          <volume>813</volume>
          {
          <fpage>840</fpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <given-names>A.</given-names>
            <surname>Rodriguez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Fernandez-Medina</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Piattini</surname>
          </string-name>
          .
          <article-title>A BPMN Extension for the Modeling of Security Requirements in Business Process</article-title>
          .
          <article-title>IEICE transactions, E90-D(4</article-title>
          ):
          <volume>745</volume>
          {
          <fpage>752</fpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18. G. Ropohl.
          <article-title>Philosophy of socio-technical systems</article-title>
          .
          <source>Society for Philosophy and Technology</source>
          ,
          <volume>4</volume>
          (
          <issue>3</issue>
          ):
          <volume>59</volume>
          {
          <fpage>71</fpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <given-names>B.</given-names>
            <surname>Schneier</surname>
          </string-name>
          .
          <article-title>Attack trees</article-title>
          .
          <source>Dr. Dobb's journal</source>
          ,
          <volume>24</volume>
          (
          <issue>12</issue>
          ):
          <volume>21</volume>
          {
          <fpage>29</fpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <given-names>M.</given-names>
            <surname>Schumacher</surname>
          </string-name>
          .
          <article-title>Security patterns and security standards</article-title>
          .
          <source>In Proceedings of the 7th European Conference on Pattern Languages of Programs (EuroPLoP)</source>
          ,
          <year>July</year>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <given-names>C. N.</given-names>
            <surname>Tarimo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. K.</given-names>
            <surname>Bakari</surname>
          </string-name>
          , L. Yngstrom, and
          <string-name>
            <given-names>S.</given-names>
            <surname>Kowalski</surname>
          </string-name>
          .
          <article-title>A social-technical view of ict security issues, trends, and challenges: Towards a culture of ict security - the case of tanzania</article-title>
          .
          <source>In ISSA</source>
          , pages
          <volume>1</volume>
          {
          <fpage>12</fpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <given-names>P.</given-names>
            <surname>Zave</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Jackson</surname>
          </string-name>
          .
          <article-title>Four dark corners of requirements engineering</article-title>
          .
          <source>ACM Trans. Softw</source>
          . Eng. Methodol.,
          <volume>6</volume>
          (
          <issue>1</issue>
          ):1{
          <fpage>30</fpage>
          ,
          <string-name>
            <surname>Jan</surname>
          </string-name>
          .
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>