<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Global Design for Secure Socio-Technical Systems</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Tong</forename><surname>Li</surname></persName>
							<email>tong.li@disi.unitn.it</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Trento via Sommarive</orgName>
								<address>
									<addrLine>14</addrLine>
									<settlement>Povo(</settlement>
									<region>TN)</region>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">John</forename><surname>Mylopoulos</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Trento via Sommarive</orgName>
								<address>
									<addrLine>14</addrLine>
									<settlement>Povo(</settlement>
									<region>TN)</region>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Fabio</forename><surname>Massacci</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Trento via Sommarive</orgName>
								<address>
									<addrLine>14</addrLine>
									<settlement>Povo(</settlement>
									<region>TN)</region>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Global Design for Secure Socio-Technical Systems</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">D48EB73F422951DA2D7B1EB3DCB8CA3D</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T04:46+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Proceedings of the XYZ Workshop</term>
					<term>Location</term>
					<term>Country</term>
					<term>DD-MMM-YYYY</term>
					<term>published at http://ceur-ws.org</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Socio-Technical Systems (STS) consist of people, software, hardware and organizational units. The pervasiveness and complexity of STSs make security analysis both particularly challenging and especially critical. Traditional security analysis techniques that address security in a piecemeal fashion (e.g. only for software, or only for business processes) are insufficient for addressing global security concerns and have been found often to leave serious STS vulnerabilities untreated. In this proposal, we aim at developing a comprehensive framework that consists of concepts, techniques and tools for designing secure STSs. In our framework, a STS consists of organizational goals and security requirements, businesses and industrial processes through which requirements are satisfied, software applications that support those processes, and system infrastructure that supports both processes and applications. We intend to propose a systematic process to analyze and design each part of the STSs, and finally provide an all-round security design for STSs.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The rapid developments of software systems, coping with information demands, have automated much of the manual tasks. There is no denying that the software systems are playing an increasingly significant role in large systems. Socio-Technical Systems (STS), as studied by Ropohl <ref type="bibr" target="#b17">[18]</ref>, introduce concepts which view systems from two perspectives-social and machine, stressing the reciprocal relationships between these perspectives. As STSs consist of many interweaving human and technical components, to design a STS, many complex sub-parts must be analyzed and well designed. For example, system organizational settings, business processes, software and infrastructures. A system can function correctly only if all the sub-components are well designed.</p><p>Security is a crucial and difficult issue for almost all systems. Ensuring security in STSs has been proved to be especially complicated <ref type="bibr" target="#b3">[4]</ref>, as addressing security means not only considering technical aspects of software, but also social aspects, such as the design of a business process. For example, if a business process, which issues customer orders, does not contain a step to check the authenticity of the order, the whole system will be vulnerable regardless of the security of other components. Moreover, the social aspect of a STS also requires to consider how do people interact with a STS. For example, if a security mechanism is too complex, stakeholders may close or bypass it, which leads the system to be vulnerable. In short, security protections for STSs are subject to the Bucket Effect: applying intensive security measures to a single component can not guarantee the security of the whole system.</p><p>Unfortunately, most existing approaches address security requirements in a piecemeal fashion, merely considering security issues for a particular narrow part, i.e. software, physical infrastructure, or business process. We argue that the security designs of different parts in STSs may influence each other in certain ways. Currently, there are no formal approaches to connect all the design concepts in different system components and analyze their mutual impacts. Thus, no systematic, global means are proposed to design fully secure STSs.</p><p>To address this problem, we plan to develop a framework which consists of concepts, processes, and tools for designing secure socio-technical system by connecting different components with each other. This framework contributes in following aspects: 1) explicitly capture and represent causal relationships among different parts of a system to support the design in each part; 2) propose a systematic process to produce secure designs for each component -the synthesis of these designs is treated as the system design, which fulfills both organizational objectives and security requirements; 3) provide a systematic means to handle system changes, while continuously satisfy both organizational objectives and security requirements.</p><p>In the remaining part of this paper, we summarize the state of the art in Sec. 2, based on which we describe concrete research topics in Sect. 3. Sect. 4 shows our research approach that deals with the identified problems. Finally, the contribution of our work is summarized in Sect. 6.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Related Work</head><p>In this section, we will summarize related work on the topic of system security analysis and design. We are able to categorize many of these works according to the analytical perspectives they hold. Specifically, we consider following four perspectives: organizational settings, business processes, software applications and physical infrastructure. Work which falls outside of these classifications are discussed in a separate subsection.</p><p>There are a number of research proposals which focus on ensuring security of organizational settings through modeling interactions among social actors, as well as some social relationships (e.g. trust, delegation, authorization) <ref type="bibr" target="#b14">[15,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b10">11]</ref>.</p><p>Security analysis which focuses on business processes aims to represent the security requirements in business process models. Analysts can use these requirements to further design secure business processes <ref type="bibr" target="#b16">[17,</ref><ref type="bibr" target="#b8">9]</ref>.</p><p>Most security efforts have focused on the technical aspects of software. There are many security analysis techniques which can represent either security attacks or security requirements, such as Abuse Case <ref type="bibr" target="#b11">[12]</ref>, Attack Tree <ref type="bibr" target="#b18">[19]</ref>. In addition, there has been much investigation into systematic processes for security requirement engineering. For example, SQUARE <ref type="bibr" target="#b12">[13]</ref> and SREP <ref type="bibr" target="#b13">[14]</ref>. Moreover, security design methodologies are used to align software developments with security requirements, which capture a lot of security domain knowledge. Examples of security design methodologies include UMLsec <ref type="bibr" target="#b9">[10]</ref> and Security Patterns <ref type="bibr" target="#b19">[20]</ref>.</p><p>Currently, there are few security approaches that focus on the infrastructure domain. Jürjens considers secure deployments in UMLsec <ref type="bibr" target="#b9">[10]</ref> , which address security issues in the physical layer.</p><p>Mouratidis and Jürjens connect security designs between the organization perspective and the software perspective by combining Secure Tropos and UMLsec <ref type="bibr" target="#b15">[16]</ref>. They provide a structured process to translate the results of organizational security requirements to pertinent software design elements to support secure software developments. However, they only transfer security requirements from the organization layer to the software layer, and do not provide feedback in the other direction.</p><p>Finally, there is another research branch that address human factors in STSs. Tarimo et al. <ref type="bibr" target="#b20">[21]</ref> discuss the importance of security culture in the security analysis of STSs. They exploit the capability of organizational behavior theory, and explain how security cultures influence security requirements of STSs. In addition, Beautement et al. <ref type="bibr" target="#b2">[3]</ref> argue that system stakeholders do concern with the costs and benefits introduced by security mechanisms, and a lot of security breaches arises due to overlooking the intentional factors of human. Thus, they propose Compliance Budget to understand human behaviors and further address the security balance problem.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Research Problem</head><p>Compared to technically-focused software systems, the socio-technical systems extend their system boundaries to include several related components, namely organization, business process and infrastructure. Although the proposed components may overlap with each other to some extent, we use them to ensure security designs cover all important aspects of STSs. Our work aims at analyzing all these essential components and investigating connections between them.</p><p>Organization component includes high-level system requirements. The concerns about organizational settings (e.g. the organizational hierarchies and policies) are considered in this domain. Business process component is considered the core part of STSs, as all organizational requirements are met through business processes, and as business processes provide instructions for both humans and software on how to work together to achieve specific goals. Software component provides concrete implementations for supporting the business process. In the meanwhile, it relies on the deployment of infrastructure. Physical infrastructure component is the backbone of software applications. The performance of software applications highly depends on related infrastructures. In addition, they may also play a role in some activities in the business process.</p><p>Human factors are the major issues in STSs. Instead of addressing human influences in an independent dimension, we consider them together with each of the above components. We aim to consider human reactions together with related system designs, which facilitate understanding human intentions. Based on the above components, our work will take the organizational goals and security requirements, which are in the organization component, as the inputs. While the outputs are a set of designs in the three left components, which work together to ensure security of the systems. In this sense, we define the designs in the software component as Software Requirement Specifications(SRS); the designs in business process component are Business Requirement Specifications(BRS) and the designs in infrastructure component are Infrastructure Requirement Specifications(IRS). Then the synthesis of all these designs is treated as the system specification, which satisfies both organizational goals and security requirements. Thus, the design of STS is defined as: System Design = BRS+SRS+IRS Current studies only take into account one of these parts and leave assumptions on other parts, which may not be held in the target system. We argue that these three parts of system designs are highly involved with each other. Without a global view on all the parts, the system under development will be vulnerable.</p><p>As a result, my research problem is summarized as developing a framework of concepts, processes, and tools for globally designing secure socio-technical systems by synthesizing designs in three different components, namely business process, software and physical infrastructure. Specifically, there are four research questions need to be addressed: 1) what are the interrelationships among the above components; 2) how to formally orchestrate analysis in different components to provide global security designs; 3) how to derive secure designs in each component; 4) how to adapt designs to handle system changes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Research Approach</head><p>In this section, we propose a research approach, which addresses the security problems in each system component, in order to derive global secure designs for STSs.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Concepts of Secure STS</head><p>To specify system designs, we apply the following three concepts Requirements (R), Specification (S) and Domain assumption (D), proposed by Zave and Jackson <ref type="bibr" target="#b21">[22]</ref>. They have been formalized as follows: D, S R. For a specific domain this formula implies that the requirements can be satisfied by the specifications under relevant domain assumptions. A number of existing works make use of this conceptualization and formalism <ref type="bibr" target="#b7">[8]</ref>, but all of them take the machine domain by default. Our work aims to consider each component of STSs as a single domain. Each of them has its only requirements, domain assumptions, and specifications. In addition, we separate SecurityRequirement(SR) from the concept Requirement(R) in order to stress the security analysis in our research. As a result, the concepts can be represented by the formula D, S R, SR. This formula is further specified for each of the proposed components. For instance, D bp , S bp R bp , SR bp represent the relevant concepts in the business process component. We structure the three components in a hierarchical way (Fig. <ref type="figure" target="#fig_0">1</ref>), which answers the research question 1.</p><p>Concretely, as shown in Fig. <ref type="figure" target="#fig_0">1</ref>, the organizational requirements are imported to the business process domain; the design of the business process domains specify the requirements for the software domain, as well as the infrastructure domain; the software domain should support business process, in the meanwhile shed light on the requirements for the infrastructure domain; finally, the infrastructure domain should support the design in other two domains. We use Tropos <ref type="bibr" target="#b4">[5]</ref>, a goal-based requirement modeling language, to represent requirements in all the layers. The specifications in all three layers are represented by BPMN <ref type="bibr" target="#b1">[2]</ref>, UML activity diagram and UML deployment diagram <ref type="bibr" target="#b0">[1]</ref> respectively. All of these models will be further extended with related security notations. In order to explicitly represent the semantics of each concepts, as well as their interrelationships, we aim to develop a formal ontology with Description Logic to capture all related knowledge (both system development and security engineering). </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Secure STS Design Process</head><p>Based on the comprehensive ontology we are planning to build, we will further propose an intuitive process to orchestrate design processes in different layers(Fig. <ref type="figure" target="#fig_0">1</ref>), which address the research question 2. In each layer, its requirements are influenced by designs of other layers. In this process framework, analysis is conducted from the business process layer to the software layer, finally to infrastructure layer. It is worth noting that the proposed process is not like waterfall model, which is analyzed once for all, but an iterative process that incrementally addresses system designs. Through these analytical processes, the traceability links between layers could be derived, which are the key issues for global system designs.</p><p>The traceability links are built from specifications in one layer to requirements in other layers, not to specifications in other layers. In this sense, we do not directly impose designs from one layer to another, which indicates designs in each layer are only subject to requirements of that layer. The benefits from this separation include: 1) the requirement model plays as the mediator to connect designs in different do-mains, which clearly separate problems and solutions. By using the intermediary requirement model, the many-to-many mapping relationships between designs that are in different layers could be simplified as one-to-many relationships, which reduce the complexity of the design work and increase the adaptability of the system design. 2) By using the goal models to represent requirements, we can exploit the inherent advantages of the goal-based analytical techniques to facilitate the design work, such as the analysis of requirement satisfaction and alternative selection. As a result, this proposed framework could be used not only for developing new systems, but also for developing systems that are based on legacy systems. If existing designs of a legacy system cannot satisfy requirements imposed by previous layers, the analysis will backtrack to the previous layers and try to find another alternative.</p><p>There are six tasks identified in the Fig. <ref type="figure" target="#fig_0">1</ref>, which outline the process for deriving an all-round system design. Concretely, the tasks 1,3 and 5 focus on how to derive general requirements and security requirements from upper layers. To this end, mapping mechanisms among layers will be defined to assist the derivation of requirements. The tasks 2,4 and 6 focus on how to derive secure designs that fulfill both general requirements and security requirements. We intend to carry out risk-based security analysis processes to derive security designs by adopting security patterns. This general analytical process will be customized for each layer according to their domain specific features. By introducing such a design process we satisfy the research question 3.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3">Evolution of Secure Design</head><p>Changes are inevitable for most systems, and these changes must be handled in a way that ensures the continued satisfaction of system requirements. The essence of our work is to combine concepts in multiple layers, based on which we are able to identify designs in different layers which are effected by change requests.</p><p>In front of changed requirements, we will incrementally evolve the system rather than re-design from scratch. Thus, appropriate strategies should be applied to promote the incremental design process. Referring to the work <ref type="bibr" target="#b5">[6]</ref>. We consider three kinds of approaches, namely minimal efforts, minimal changes and maximal familiarities.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.4">Approach Illustration</head><p>The expected contribution of this research is providing a systematic means to globally design a secure STS. In this part, we use a simple example to show the ideal system development process. A smart grid real-time pricing scenario is used as an example for illustration. Due to the space limitation, we only focus on a particular part of this example, which is highlighted by dotted rectangles. The whole design process is shown in Fig. <ref type="figure" target="#fig_1">2</ref>, which stick to the process described in Fig. <ref type="figure" target="#fig_0">1</ref>. Except for the notations introduced by existing work(e.g. Tropos, BPMN, UML), we add another two concepts, domain assumption and security objective, into the design process. Domain assumption represents the assumption that are taken during system design, and security objective represents security properties that have to be held during a goal achievement process. Fig. <ref type="figure" target="#fig_1">2</ref> shows an intuitive order for system design, which could be conducted backwards and iteratively as necessary.</p><p>When there is a change happens at arbitrary part of the system design, the system will evolve accordingly to continuously satisfy the organizational goals. Fig. <ref type="figure">3</ref> represents a redesign process via traceability links. Concretely, the change first cause a backwards propagation as shown in the upper part of Fig. <ref type="figure">3</ref>. The propagation will be Fig. <ref type="figure">3</ref>. Illustration of a system evolution according to a change stopped until the change could be handled, e.g. find an alternative way to replace the unsatisfied requirement. After that, the system will forward the new design to related parts to "implement" it.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Evaluation Plan</head><p>Our framework aims to support the secure system design for socio-technical systems, and it is supposed to provide an all-around solution within comparatively efficient processes. To ensure the effectiveness and efficiency of the proposed framework, we should follow an evaluation methodology to examine the practical value of our work.</p><p>Tool support We are intended to develop a CASE tool, which can support all the steps of our analytical framework. Enhanced by this tool, the system design process could be done in a semi-automatic way. For the task 3 and 5, the tool can analyze the designs in upper layers and generate potential requirements, which will be further confirmed and modified by human. For task 2, 4 and 6, the tool will assist the security analysis processes to derive security design in each layer. In addition, the tool is able to analyze the ripple-effects of specific changes. All the design fragments influenced by the changes will be presented by the tool, and the customer will take the final decisions about which part should be changed.</p><p>Case study We will apply our design methods to a real socio-technical system, such as smart grid and electrical healthy system. The key point of the case study is to take out the theoretical method from laboratory to practice in order to check whether it works in reality. To this end, a number of factors need to be considered during the case study, such as the background of the method adopter, the time span for learning the method, the help or guide provided by the method designer. We need to exploit the influential factors as many as possible to provide an in-depth evaluation for our method. In addition, if it is possible we are planning to compare our method with other related work on the same case study to examine the advantages and disadvantages of our method.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Contribution</head><p>In summary, satisfaction of the proposed research goals via execution of the described plans will contribute to the state of the art by providing:</p><p>1. A conceptual multi-layer framework to understand the secure socio-technical system in a comprehensive way, specifically to understand the interactions among different system components. 2. A methodology to globally design secure socio-technical systems, which satisfy both organizational objectives and security requirements, either based on an existing system or for a new system. The methodology is aimed to enable the evolution of system design to manage requested changes, while continuously fulfilling organizational objectives and security requirements. 3. A tool that supports all the analytical steps of the proposed methodology. The tool will allow us to carry out an evaluation to examine the practical value of our work.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Process for multi-layer system design</figDesc><graphic coords="4,149.85,103.29,315.89,151.96" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Illustration of global design for secure STS</figDesc><graphic coords="5,113.40,155.71,388.78,426.52" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="6,113.40,54.07,388.79,214.88" type="bitmap" /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<ptr target="http://www.omg.org/spec/UML/2.1.2/" />
		<title level="m">Unified Modeling Language</title>
				<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<ptr target="http://www.omg.org/spec/BPMN/2.0/" />
		<title level="m">Business Process Modeling Notation</title>
				<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">The compliance budget: managing security behaviour in organisations</title>
		<author>
			<persName><forename type="first">A</forename><surname>Beautement</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Sasse</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Wonham</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2008 workshop on New security paradigms, NSPW &apos;08</title>
				<meeting>the 2008 workshop on New security paradigms, NSPW &apos;08<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="47" to="58" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">STS Perspective MIS Problems and Failures : A Socio-Technical Perspective PART I : THE CAUSES</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">P</forename><surname>Bostrom</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">S</forename><surname>Heinen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">MIS Quarterly</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="17" to="32" />
			<date type="published" when="1977">1977</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">Tropos: An agent-oriented software development methodology</title>
		<author>
			<persName><forename type="first">P</forename><surname>Bresciani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Perini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Giorgini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Giunchiglia</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
			<publisher>Agents and Multi-Agent</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Finding incremental solutions for evolving requirements</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">A</forename><surname>Ernst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Borgida</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Jureta</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of 19th IEEE International Requirements Engineering Conference (RE)</title>
				<meeting>19th IEEE International Requirements Engineering Conference (RE)</meeting>
		<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="volume">0</biblScope>
			<biblScope unit="page" from="15" to="24" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Security and trust requirements engineering</title>
		<author>
			<persName><forename type="first">P</forename><surname>Giorgini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Massacci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Zannone</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Foundations of Security Analysis and Design III</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="volume">3655</biblScope>
			<biblScope unit="page" from="237" to="272" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Security requirements engineering: A framework for representation and analysis</title>
		<author>
			<persName><forename type="first">C</forename><surname>Haley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Laney</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Moffett</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Nuseibeh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Software Engineering</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="133" to="153" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
	<note>IEEE Transactions on</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Security requirement analysis of business processes</title>
		<author>
			<persName><forename type="first">P</forename><surname>Herrmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Herrmann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Electronic Commerce Research</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">3-4</biblScope>
			<biblScope unit="page" from="305" to="335" />
			<date type="published" when="2006-10">Oct. 2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">UMLsec: Extending UML for Secure Systems Development</title>
		<author>
			<persName><forename type="first">J</forename><surname>Jürjens</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 5th International Conference on The Unified Modeling Language</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<meeting>the 5th International Conference on The Unified Modeling Language</meeting>
		<imprint>
			<date type="published" when="2002">2002</date>
			<biblScope unit="volume">2460</biblScope>
			<biblScope unit="page" from="412" to="425" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Security and privacy requirements analysis within a social setting</title>
		<author>
			<persName><forename type="first">L</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mylopoulos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings IEEE international conference on requirements engineering (RE&apos;03)</title>
				<meeting>IEEE international conference on requirements engineering (RE&apos;03)<address><addrLine>Monterey, California</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2003">2003</date>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="151" to="161" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Using abuse case models for security requirements analysis</title>
		<author>
			<persName><forename type="first">J</forename><surname>Mcdermott</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Fox</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">15th Annual Computer Security Applications Conference</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="1999">1999</date>
			<biblScope unit="page" from="55" to="64" />
		</imprint>
	</monogr>
	<note>ACSAC&apos;99) Proceedings.</note>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Security quality requirements engineering (SQUARE) methodology</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">R</forename><surname>Mead</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Stehney</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM SIGSOFT Software Engineering Notes</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="issue">4</biblScope>
			<date type="published" when="2005-07">July 2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">A common criteria based security requirements engineering process for the development of secure information systems</title>
		<author>
			<persName><forename type="first">D</forename><surname>Mellado</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Fernández-Medina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Piattini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Standards &amp; Interfaces</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="244" to="253" />
			<date type="published" when="2007-02">Feb. 2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">A natural extension of tropos methodology for modelling security</title>
		<author>
			<persName><forename type="first">H</forename><surname>Mouratidis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Giorgini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">the Proceedings of the Agent Oriented Methodologies Workshop (OOPSLA 2002)</title>
				<meeting><address><addrLine>Seattle-USA</addrLine></address></meeting>
		<imprint>
			<publisher>Citeseer</publisher>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">From Goal-Driven Security Requirements Engineering to Secure Design</title>
		<author>
			<persName><forename type="first">H</forename><surname>Mouratidis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Jurjens</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Intelligent System</title>
		<imprint>
			<biblScope unit="volume">25</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="813" to="840" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">A BPMN Extension for the Modeling of Security Requirements in Business Process</title>
		<author>
			<persName><forename type="first">A</forename><surname>Rodriguez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Fernandez-Medina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Piattini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEICE transactions, E90-D</title>
		<imprint>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="745" to="752" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Philosophy of socio-technical systems</title>
		<author>
			<persName><forename type="first">G</forename><surname>Ropohl</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Society for Philosophy and Technology</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="59" to="71" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Attack trees. Dr</title>
		<author>
			<persName><forename type="first">B</forename><surname>Schneier</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Dobb&apos;s journal</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="issue">12</biblScope>
			<biblScope unit="page" from="21" to="29" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Security patterns and security standards</title>
		<author>
			<persName><forename type="first">M</forename><surname>Schumacher</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 7th European Conference on Pattern Languages of Programs (EuroPLoP)</title>
				<meeting>the 7th European Conference on Pattern Languages of Programs (EuroPLoP)</meeting>
		<imprint>
			<date type="published" when="2002-07">July, 2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">A social-technical view of ict security issues, trends, and challenges: Towards a culture of ict security -the case of tanzania</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">N</forename><surname>Tarimo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">K</forename><surname>Bakari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Yngström</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kowalski</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ISSA</title>
		<imprint>
			<biblScope unit="page" from="1" to="12" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Four dark corners of requirements engineering</title>
		<author>
			<persName><forename type="first">P</forename><surname>Zave</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Jackson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Softw. Eng. Methodol</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="1" to="30" />
			<date type="published" when="1997-01">Jan. 1997</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
