Abstract
It has been argued that security concerns should inform all the stages of the development process of an agent-based system. However, this is not the case since current agent-oriented methodologies do not, usually, consider security concepts within their modelling ontology. In this paper we present extensions to the Tropos ontology to enable it to model security.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Iglesias, C., Garijo, M., Gonzales, J.: A survey of agent-oriented methodologies. In: Rao, A.S., Muller, J.P., Singh, M.P. (eds.) Intelligent Agents IV. LNCS, Springer, Heidelberg (1999)
Castro, J., Kolp, M., Mylopoulos, J.: A Requirements-Driven Development Methodology. In: Dittrich, K.R., Geppert, A., Norrie, M.C. (eds.) CAiSE 2001. LNCS, vol. 2068, p. 108. Springer, Heidelberg (2001)
Mouratidis, H., Giogini, P., Manson, G.: Modelling Secure Multiagent Systems. In: The Proceedings of the 2nd International Joint Conference on Autonomous Agents and Multiagent Systems (July 2003) (to appear)
Fuxman, A., Giorgini, P., Kolp, M.: Information Systems as Social Structures. In: Proceedings of the Second International Conference on Formal Ontologies for Information Systems (FOIS-2001), Ogunquit, USA, October 17-19 (2001)
Yu, E.: Modelling Strategic Relationships for Process Reengineering, PhD thesis, Department of Computer Science, University of Toronto, Canada (1995)
Mouratidis, H., Philp, I., Manson, G.: Analysis and Design of eSAP: An Integrated Health and Social Care Information System. In: The Proceedings of the 7th International Symposium on Health Information Management Research (ISHIMR 2002), Sheffield (July 2002)
Fuxman, A., Pistore, M., Mylopoulos, J., Traverso, P.: Model Checking Early Requirements Specification in Tropos. In: The Proceedings of the 5th Int. Symposium on Requirements Engineering, RE 2001, Toronto, Canada (2001)
Sommerville: Software Engineering, 6th edn. Addison-Wesley, Reading (2001)
Mouratidis, H.: Extending Tropos Methodology to Accommodate Security. Progress Report, Computer Science Department, University of Sheffield (October 2002)
Dardenne, A., Van Lamsweerde, A., Fickas, S.: Goal-directed Requirements Acquisition. Science of Computer Programming 20, 3–50 (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mouratidis, H., Giorgini, P., Manson, G. (2003). An Ontology for Modelling Security: The Tropos Approach. In: Palade, V., Howlett, R.J., Jain, L. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2003. Lecture Notes in Computer Science(), vol 2773. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45224-9_187
Download citation
DOI: https://doi.org/10.1007/978-3-540-45224-9_187
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40803-1
Online ISBN: 978-3-540-45224-9
eBook Packages: Springer Book Archive