Abstract
We present a set of process patterns that can be used to as a systematic way of analysing security requirements in a novel domain, taking ubiquitous healthcare as an example.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Adolph, S., Bramble, P., Cockburn, A., Pols, A.: Patterns for Effective Use Cases. Addison-Wesley, Reading (2003)
Alexander, C., et al.: A Pattern Language: towns, buildings, construction. OUP (1977)
Anderson, R.J.: Security in Clinical Information Systems (January 1996). British Medical Association,(1996)
Anderson, R.J.: An Update on the BMA Security Policy (1996), Available from http://www.cl.cam.ac.uk/users/rja14/bmaupdate/bmaupdate.html
Bardram, J.E.: Hospitals of the Future – ubiquitous computing support for medical work in hospitals. In: Proc. Second Ubiquitous Healthcare Computing (2003)
Beck, K.: Smalltalk Best Practice Patterns. Prentice Hall, Englewood Cliffs (1997)
Bohn, J., Gartner, F., Vogt, H.: Dependability Issues of Pervasive Computing in a Healthcare Environment. In: Proc. First International Security in Pervasive Computing (2003)
Brown, W.J., et al.: AntiPatterns. Wiley, Chichester (1998)
Cockburn, A.: Writing Effective Use Cases. Addison-Wesley, Reading (2001)
Coplien, J.O.: A generative development-process pattern language. In: Coplien, J.O., Schmidt, D.C. (eds.) Pattern Languages of Program Design. Addison-Wesley, Reading (1995)
Fowler, M.: Analysis Patterns. Addison-Wesley, Reading (1997)
Gamma, E., et al.: Design Patterns. Addison-Wesley, Reading (1995)
Jackson, M.: Problem Frames. Addison Wesley, Reading (2001)
Liu, Y.: Security in Ubiquitous Healthcare Systems. MSc thesis, Dept Computer Science, University of York, UK (2004)
The Open Group. Guide to Security Patterns, Draft 1 (April 2002)
Stepney, S., Polack, F., Toyn, I.: An Outline Pattern Language for Z. In: Bert, D., P. Bowen, J., King, S., et al. (eds.) ZB 2003. LNCS, vol. 2651, pp. 2–19. Springer, Heidelberg (2003)
Vaclav, J.M.: Protecting Doctors’ Identity in Drug Prescription Analysis. Health Informatics Journal (December1998)
Medieval Theories of Analogy. Entry in Stanford Encyclopedia of Philosophy, http://plato.stanford.edu/entries/analogy-medieval/#3
Srivatanakul, T., Clark, J.A., Polack, F.A.C.: Effective Security Requirements Analysis: HAZOP and Use Cases. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 416–427. Springer, Heidelberg (2004)
Srivratanakul, J., Clark, J., Polack, F., Stepney, S.: Challenging Formal Specifications with Mutation: A CSP Security Example. In: Proceedings of the 12th IEEE Asia Pacific Software Engineering Conference, APSEC (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, Y., Clark, J.A., Stepney, S. (2005). “Devices Are People Too” Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example. In: Hutter, D., Ullmann, M. (eds) Security in Pervasive Computing. SPC 2005. Lecture Notes in Computer Science, vol 3450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-32004-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-540-32004-3_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25521-5
Online ISBN: 978-3-540-32004-3
eBook Packages: Computer ScienceComputer Science (R0)