<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>STS-Tool: Specifying and Reasoning over Socio-Technical Security Requirements</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Elda Paja</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Fabiano Dalpiaz</string-name>
          <email>dalpiaz@cs.toronto.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mauro Poggianella</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pierluigi Roberti</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Paolo Giorgini</string-name>
          <email>paolo.giorginig@unitn.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Toronto</institution>
          ,
          <country country="CA">Canada</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Trento</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2013</year>
      </pub-date>
      <volume>978</volume>
      <fpage>131</fpage>
      <lpage>133</lpage>
      <abstract>
        <p>STS-Tool is the modelling and analysis support tool for STSml, our proposed actor- and goal-oriented security requirements modelling language for Socio-Technical Systems (STSs). STS-Tool allows designers to model an STS through high-level primitives, to express security constraints over the interactions between the actors in the STS, as well as to derive security requirements once the modelling is completed. The tool features a set of automated reasoning techniques for (i) checking if a given STS-ml model is well-formed, and (ii) determining if the speci cation of security requirements is consistent, that is, there are no con icts among security requirements. We have implemented these techniques using disjuntive datalog programs.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>STS-Tool
STS-Tool is the modelling and analysis support tool for STS-ml. It is an Eclipse
Rich Client Platform application written in Java, it is distributed as a
compressed archive for multiple platforms (Win 32/64, Mac OS X, Linux), and it is
freely available for download from http://www.sts-tool.eu. The website
includes extensive documentation including manuals, video tutorials, and lectures.
STS-Tool has the following features:
{ Diagrammatic: the tool enables the creation (drawing) of diagrams. Apart
from typical create/modify/save/load operations, the tool also supports:
Providing di erent views on a diagram, speci cally: social view,
information view, authorisation view. Each view shows speci c elements and
hides others, while keeping always visible elements that serve as
connection points between the views (e.g., roles and agents). Inter-view
consistency is ensured by for instance propagating insertion or deletion of
certain elements to all views.</p>
      <p>Ensuring diagram validity (online): the models are checked for syntactic/
well-formedness validity while being drawn.</p>
      <p>Exporting diagrams to di erent le formats (png, jpg, pdf, svg, etc.).
{ Automatic derivation of security requirements : security requirements are
generated from a model as relationships between a requester and a
responsible actor for the satisfaction of a security need. Security requirements can
be sorted or ltered according to their di erent attributes.
{ Automated reasoning</p>
      <p>O ine well-formedness analysis : some well-formedness rules of STS-ml
are computationally too expensive for online veri cation, or their
continuous analysis would limit the exibility of the modelling activities. Thus,
some analyses about well-formedness are performed upon explicit user
request. In Fig. 1, o ine well-formedness analysis has found no errors.
Security analysis : verify (i) if the security requirements speci cation is
consistent|no requirements are potentially con icting; (ii) if the
diagram allows the satisfaction of the speci ed security requirements. This
analysis is implemented in disjunctive Datalog and consists of comparing
the possible actor behaviors that the model describes against the security
requirements. The results are enumerated in a tabular form below the
diagram, and rendered visible on the diagram itself when selected (see
Fig. 1). A textual description provides details on the identi ed con icts.
{ Generating requirements documents : the modelling process terminates with
the generation of a security requirements document, which supports the
communication between the analyst and stakeholders. This document is
customisable: the analyst can choose among a number of model features to
include in the report (e.g., including only a subset of the actors, concepts
or relations he or she wants more information about). The diagrams are
explained in detail providing textual and tabular descriptions of the models.
An example report is provided in 3.</p>
      <p>
        The current version of STS-Tool (v1.3.1) is ready for public use. This version
of the tool is the result of an iterative development process, having been tested
on multiple case studies and evaluated with practitioners [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] in the scope of the
3 http://www.sts-tool.eu/Documentation.php
      </p>
      <p>Tabs to switch between different views
document provision</p>
      <p>expressing
security needs
goal delegation
selected conflict
is visualised
Identification
of conflicts</p>
      <p>through
Security Analysis</p>
      <p>ownership
!"#$%$&amp;'($0:</p>
      <p>List of security requirements</p>
      <p>The diagram is well-formed</p>
      <p>Textual description of the identified conflict</p>
      <p>9)$%/ aolploewraetido/npsrohibited !""#$%$&amp;#'(7'&amp;$&amp;-/0%'(
5"$(-$#6
'&amp;&amp;)*+'( ;'#6$&lt;(/5:
;'#6$&lt;(/5:
!"#$%$&amp;'(
'&amp;&amp;)*+'(
8*#0)'%0
-)'30
733$%$'(
%*#0)'%0 ;'#6$&lt;(/5: 9')073
;'#6$&lt;(/5:
2'(/
$#3*)4'0$*#
9')073
,'#-.
-/0'$I(1nformation view</p>
      <p>3-$%,
3!'-)91
+'(,
$#1/-2')$/#
3'!-)91
+,((,</p>
      <p>!"#$%$&amp;'($)*
" # $ %
+'(,7$#1/-2')$/#
8&amp;&amp;-/0'(7&amp;-/0$5,5 !"#$%$&amp;'(</p>
      <p>
        " # $ % '&amp;&amp;-/0'(
!"#$%$&amp;'(7'&amp;&amp;-/0'( +'(,7$#1/-2')$/# information
./0,-#2,#)7#/)$1$,5
goal scope
,./0
'&amp;&amp;($%')$/#
FP7 European Project Aniketos 4. It has proven suitable to model and reason
over models of a large size from di erent domains [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], such as eGovernment,
Telecommunications, and Air Tra c Management Control.
      </p>
      <p>Acknowledgments. The research leading to these results has received
funding from the European Union Seventh Framework Programme (FP7/2007-2013)
under grant no 257930 (Aniketos) and 256980 (NESSoS).
4 http://www.aniketos.eu</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>F.</given-names>
            <surname>Dalpiaz</surname>
          </string-name>
          , E. Paja, and
          <string-name>
            <given-names>P.</given-names>
            <surname>Giorgini</surname>
          </string-name>
          .
          <article-title>Security requirements engineering via commitments</article-title>
          .
          <source>In Proc. of STAST'11</source>
          , pages
          <issue>1{8</issue>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>E.</given-names>
            <surname>Paja</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Dalpiaz</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Giorgini</surname>
          </string-name>
          .
          <article-title>Identifying con icts in security requirements with STS-ml</article-title>
          .
          <source>TR DISI-12-041</source>
          , University of Trento, http://disi.unitn. it/~paja/tr
          <article-title>-identifying-sec-conflicts</article-title>
          .pdf,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Singh</surname>
          </string-name>
          .
          <article-title>An ontology for commitments in multiagent systems: Toward a uni - cation of normative concepts</article-title>
          .
          <source>Arti cial Intelligence and Law</source>
          ,
          <volume>7</volume>
          (
          <issue>1</issue>
          ):
          <volume>97</volume>
          {
          <fpage>113</fpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4. S. Trosterer, E. Beck,
          <string-name>
            <given-names>F.</given-names>
            <surname>Dalpiaz</surname>
          </string-name>
          , E. Paja,
          <string-name>
            <given-names>P.</given-names>
            <surname>Giorgini</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Tscheligi</surname>
          </string-name>
          .
          <article-title>Formative user-centered evaluation of security modeling: Results from a case study</article-title>
          .
          <source>IJSSE</source>
          ,
          <volume>3</volume>
          (
          <issue>1</issue>
          ):1{
          <fpage>19</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>