Skip to main content

“Devices Are People Too” Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example

  • Conference paper
Security in Pervasive Computing (SPC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3450))

Included in the following conference series:

Abstract

We present a set of process patterns that can be used to as a systematic way of analysing security requirements in a novel domain, taking ubiquitous healthcare as an example.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adolph, S., Bramble, P., Cockburn, A., Pols, A.: Patterns for Effective Use Cases. Addison-Wesley, Reading (2003)

    Google Scholar 

  2. Alexander, C., et al.: A Pattern Language: towns, buildings, construction. OUP (1977)

    Google Scholar 

  3. Anderson, R.J.: Security in Clinical Information Systems (January 1996). British Medical Association,(1996)

    Google Scholar 

  4. Anderson, R.J.: An Update on the BMA Security Policy (1996), Available from http://www.cl.cam.ac.uk/users/rja14/bmaupdate/bmaupdate.html

  5. Bardram, J.E.: Hospitals of the Future – ubiquitous computing support for medical work in hospitals. In: Proc. Second Ubiquitous Healthcare Computing (2003)

    Google Scholar 

  6. Beck, K.: Smalltalk Best Practice Patterns. Prentice Hall, Englewood Cliffs (1997)

    Google Scholar 

  7. Bohn, J., Gartner, F., Vogt, H.: Dependability Issues of Pervasive Computing in a Healthcare Environment. In: Proc. First International Security in Pervasive Computing (2003)

    Google Scholar 

  8. Brown, W.J., et al.: AntiPatterns. Wiley, Chichester (1998)

    Google Scholar 

  9. Cockburn, A.: Writing Effective Use Cases. Addison-Wesley, Reading (2001)

    Google Scholar 

  10. Coplien, J.O.: A generative development-process pattern language. In: Coplien, J.O., Schmidt, D.C. (eds.) Pattern Languages of Program Design. Addison-Wesley, Reading (1995)

    Google Scholar 

  11. Fowler, M.: Analysis Patterns. Addison-Wesley, Reading (1997)

    Google Scholar 

  12. Gamma, E., et al.: Design Patterns. Addison-Wesley, Reading (1995)

    Google Scholar 

  13. Jackson, M.: Problem Frames. Addison Wesley, Reading (2001)

    Google Scholar 

  14. Liu, Y.: Security in Ubiquitous Healthcare Systems. MSc thesis, Dept Computer Science, University of York, UK (2004)

    Google Scholar 

  15. The Open Group. Guide to Security Patterns, Draft 1 (April 2002)

    Google Scholar 

  16. Stepney, S., Polack, F., Toyn, I.: An Outline Pattern Language for Z. In: Bert, D., P. Bowen, J., King, S., et al. (eds.) ZB 2003. LNCS, vol. 2651, pp. 2–19. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  17. Vaclav, J.M.: Protecting Doctors’ Identity in Drug Prescription Analysis. Health Informatics Journal (December1998)

    Google Scholar 

  18. Medieval Theories of Analogy. Entry in Stanford Encyclopedia of Philosophy, http://plato.stanford.edu/entries/analogy-medieval/#3

  19. Srivatanakul, T., Clark, J.A., Polack, F.A.C.: Effective Security Requirements Analysis: HAZOP and Use Cases. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 416–427. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  20. Srivratanakul, J., Clark, J., Polack, F., Stepney, S.: Challenging Formal Specifications with Mutation: A CSP Security Example. In: Proceedings of the 12th IEEE Asia Pacific Software Engineering Conference, APSEC (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, Y., Clark, J.A., Stepney, S. (2005). “Devices Are People Too” Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example. In: Hutter, D., Ullmann, M. (eds) Security in Pervasive Computing. SPC 2005. Lecture Notes in Computer Science, vol 3450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-32004-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-32004-3_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25521-5

  • Online ISBN: 978-3-540-32004-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics