Reference Hub7
Modelling Security Using Trust Based Concepts

Modelling Security Using Trust Based Concepts

Michalis Pavlidis, Haralambos Mouratidis, Shareeful Islam
Copyright: © 2012 |Volume: 3 |Issue: 2 |Pages: 18
ISSN: 1947-3036|EISSN: 1947-3044|EISBN13: 9781466613980|DOI: 10.4018/jsse.2012040102
Cite Article Cite Article

MLA

Pavlidis, Michalis, et al. "Modelling Security Using Trust Based Concepts." IJSSE vol.3, no.2 2012: pp.36-53. http://doi.org/10.4018/jsse.2012040102

APA

Pavlidis, M., Mouratidis, H., & Islam, S. (2012). Modelling Security Using Trust Based Concepts. International Journal of Secure Software Engineering (IJSSE), 3(2), 36-53. http://doi.org/10.4018/jsse.2012040102

Chicago

Pavlidis, Michalis, Haralambos Mouratidis, and Shareeful Islam. "Modelling Security Using Trust Based Concepts," International Journal of Secure Software Engineering (IJSSE) 3, no.2: 36-53. http://doi.org/10.4018/jsse.2012040102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Security modelling and analysing not only require solving technical problems but also reasoning on the organization as a whole for the development of a secure system. Assumptions exist about trust relationships among actors within the system environment, which play an important role in modelling and analysing security. Such assumptions are critical and must be analysed systematically for ensuring the overall system security. In this paper, the authors introduce trust-based concepts to identify these trust assumptions, and integrate the trust concepts with security concepts for the development of secure software systems. For this purpose, Secure Tropos’ security modelling activities are extended with trust modelling activities based on the trust-based concepts. The CASE tool SecTro was extended to include the notation of the trust-based concepts to support the methodology. Finally, a running example from the UK National Health Service (NHS) domain is used to demonstrate how trust can be used for security modelling.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.