Reference Hub5
Organizational Patterns for Security and Dependability: From Design to Application

Organizational Patterns for Security and Dependability: From Design to Application

Yudis Asnar, Fabio Massacci, Ayda Saidane, Carlo Riccucci, Massimo Felici, Alessandra Tedeschi, Paul El-Khoury, Keqin Li, Magali Séguran, Nicola Zannone
Copyright: © 2011 |Volume: 2 |Issue: 3 |Pages: 22
ISSN: 1947-3036|EISSN: 1947-3044|EISBN13: 9781613508978|DOI: 10.4018/jsse.2011070101
Cite Article Cite Article

MLA

Asnar, Yudis, et al. "Organizational Patterns for Security and Dependability: From Design to Application." IJSSE vol.2, no.3 2011: pp.1-22. http://doi.org/10.4018/jsse.2011070101

APA

Asnar, Y., Massacci, F., Saidane, A., Riccucci, C., Felici, M., Tedeschi, A., El-Khoury, P., Li, K., Séguran, M., & Zannone, N. (2011). Organizational Patterns for Security and Dependability: From Design to Application. International Journal of Secure Software Engineering (IJSSE), 2(3), 1-22. http://doi.org/10.4018/jsse.2011070101

Chicago

Asnar, Yudis, et al. "Organizational Patterns for Security and Dependability: From Design to Application," International Journal of Secure Software Engineering (IJSSE) 2, no.3: 1-22. http://doi.org/10.4018/jsse.2011070101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Designing secure and dependable IT systems requires a deep analysis of organizational as well as social aspects of the environment where the system will operate. Domain experts and analysts often face security and dependability (S&D) issues they have already encountered before. These concerns require the design of S&D patterns to facilitate designers when developing IT systems. This article presents the experience in designing S&D organizational patterns, which was gained in the course of an industry lead EU project. The authors use an agent-goal-oriented modeling framework (i.e., the SI* framework) to analyze organizational settings jointly with technical functionalities. This framework can assist domain experts and analysts in designing S&D patterns from their experience, validating them by proof-of-concept implementations, and applying them to increase the security level of the system.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.