Skip to main content

2016 | OriginalPaper | Buchkapitel

Privacy-Aware Trust Negotiation

verfasst von : Ruben Rios, Carmen Fernandez-Gago, Javier Lopez

Erschienen in: Security and Trust Management

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Software engineering and information security have traditionally followed divergent paths but lately some efforts have been made to consider security from the early phases of the Software Development Life Cycle (SDLC). This paper follows this line and concentrates on the incorporation of trust negotiations during the requirements engineering phase. More precisely, we provide an extension to the SI* modelling language, which is further formalised using Answer Set Programming specifications to support the automatic verification of the model and the detection of privacy conflicts caused by trust negotiations.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
N.B. That we assume that the goal is always common. The consideration of different goals is out of the scope of the paper.
 
2
The notion of actor is inherited from i* and is used only when it is not necessary to distinguish between the concepts of agent and role.
 
3
Note that pentagons point to the party whose information is being demanded.
 
4
Actors are used for simplicity but the actual predicates and rules should consider roles and agents as arguments.
 
5
We use the \(\succeq \) symbol to compare ordinal values: \(High \succ Medium \succ Low\).
 
Literatur
1.
Zurück zum Zitat Asnar, Y., Li, T., Massacci, F., Paci, F.: Computer aided threat identification. In: 13th IEEE Conference on Commerce and Enterprise Computing, pp. 145–152 (2011) Asnar, Y., Li, T., Massacci, F., Paci, F.: Computer aided threat identification. In: 13th IEEE Conference on Commerce and Enterprise Computing, pp. 145–152 (2011)
2.
Zurück zum Zitat Brewka, G., Eiter, T., Truszczyński, M.: Answer set programming at a glance. Commun. ACM 54(12), 92–103 (2011)CrossRef Brewka, G., Eiter, T., Truszczyński, M.: Answer set programming at a glance. Commun. ACM 54(12), 92–103 (2011)CrossRef
3.
Zurück zum Zitat Castro, J., Giorgini, P., Kolp, M., Mylopoulos, J.: Tropos: a requirements-driven methodology for agent-oriented software. In: Henderson-Sellers, B., Giorgini, P. (eds.) Agent-Oriented Methodologies. Idea Group, Hershey (2005) Castro, J., Giorgini, P., Kolp, M., Mylopoulos, J.: Tropos: a requirements-driven methodology for agent-oriented software. In: Henderson-Sellers, B., Giorgini, P. (eds.) Agent-Oriented Methodologies. Idea Group, Hershey (2005)
4.
Zurück zum Zitat Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir. Eng. 16(1), 3–32 (2011)CrossRef Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir. Eng. 16(1), 3–32 (2011)CrossRef
5.
Zurück zum Zitat Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: the PriS method. Requir. Eng. 13, 241–255 (2008)CrossRef Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: the PriS method. Requir. Eng. 13, 241–255 (2008)CrossRef
6.
Zurück zum Zitat Massacci, F., Mylopoulos, J., Zannone, N.: Security requirements engineering: the SI* modeling language and the secure tropos methodology. In: Ras, Z.W., Tsay, L.-S. (eds.) Advances in Intelligent Information Systems. SCI, vol. 265, pp. 147–174. Springer, Heidelberg (2010) Massacci, F., Mylopoulos, J., Zannone, N.: Security requirements engineering: the SI* modeling language and the secure tropos methodology. In: Ras, Z.W., Tsay, L.-S. (eds.) Advances in Intelligent Information Systems. SCI, vol. 265, pp. 147–174. Springer, Heidelberg (2010)
7.
Zurück zum Zitat Mouratidis, H., GiorginiI, P.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Know. 17(02), 285–309 (2007)CrossRef Mouratidis, H., GiorginiI, P.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Know. 17(02), 285–309 (2007)CrossRef
8.
Zurück zum Zitat Notario, N., Crespo, A., Martín, Y., del Álamo, J.M., Métayer, D.L., Antignac, T., Kung, A., Kroener, I., Wright, D.: PRIPARE: integrating privacy best practices into a privacy engineering methodology. In: International Workshop on Privacy, Engineering, pp. 151–158 (2015) Notario, N., Crespo, A., Martín, Y., del Álamo, J.M., Métayer, D.L., Antignac, T., Kung, A., Kroener, I., Wright, D.: PRIPARE: integrating privacy best practices into a privacy engineering methodology. In: International Workshop on Privacy, Engineering, pp. 151–158 (2015)
9.
Zurück zum Zitat Paci, F., Fernandez-Gago, C., Moyano, F.: Detecting insider threats: a trust-aware framework. In: 8th International Conference on Availability, Reliability and Security (ARES), pp. 121–130, September 2013 Paci, F., Fernandez-Gago, C., Moyano, F.: Detecting insider threats: a trust-aware framework. In: 8th International Conference on Availability, Reliability and Security (ARES), pp. 121–130, September 2013
10.
Zurück zum Zitat Paja, E., Dalpiaz, F., Giorgini, P.: Modelling and reasoning about security requirements in socio-technical systems. Data Knowl. Eng. 98, 123–143 (2015)CrossRef Paja, E., Dalpiaz, F., Giorgini, P.: Modelling and reasoning about security requirements in socio-technical systems. Data Knowl. Eng. 98, 123–143 (2015)CrossRef
11.
Zurück zum Zitat Squicciarini, A., Bertino, E., Ferrari, E., Paci, F., Thuraisingham, B.: PP-Trust-X: a system for privacy preserving trust negotiations. ACM Trans. Inf. Syst. Secur. 10(3), 1–50 (2007)CrossRef Squicciarini, A., Bertino, E., Ferrari, E., Paci, F., Thuraisingham, B.: PP-Trust-X: a system for privacy preserving trust negotiations. ACM Trans. Inf. Syst. Secur. 10(3), 1–50 (2007)CrossRef
12.
Zurück zum Zitat van Lamsweerde, A.: Elaborating security requirements by construction of intentional anti-models. In: 26th International Conference on Software Engineering, ICSE 2004, pp. 148–157. IEEE Computer Society, Washington, DC (2004) van Lamsweerde, A.: Elaborating security requirements by construction of intentional anti-models. In: 26th International Conference on Software Engineering, ICSE 2004, pp. 148–157. IEEE Computer Society, Washington, DC (2004)
13.
Zurück zum Zitat van Lamsweerde, A., Letier, E.: Handling obstacles in goal-oriented requirements engineering. IEEE T Softw. Eng. 26(10), 978–1005 (2000)CrossRef van Lamsweerde, A., Letier, E.: Handling obstacles in goal-oriented requirements engineering. IEEE T Softw. Eng. 26(10), 978–1005 (2000)CrossRef
14.
Zurück zum Zitat van Lamsweerde, A., Darimont, R., Letier, E.: Managing conflicts in goal-driven requirements engineering. IEEE T Softw. Eng. 24(11), 908–926 (1998)CrossRef van Lamsweerde, A., Darimont, R., Letier, E.: Managing conflicts in goal-driven requirements engineering. IEEE T Softw. Eng. 24(11), 908–926 (1998)CrossRef
15.
Zurück zum Zitat Winslett, M., Yu, T., Seamons, K.E., Hess, A., Jacobson, J., Jarvis, R., Smith, B., Yu, L.: Negotiating trust on the web. IEEE Internet Comput. 6(6), 30–37 (2002)CrossRef Winslett, M., Yu, T., Seamons, K.E., Hess, A., Jacobson, J., Jarvis, R., Smith, B., Yu, L.: Negotiating trust on the web. IEEE Internet Comput. 6(6), 30–37 (2002)CrossRef
16.
Zurück zum Zitat Yu, E.: Modelling strategic relationships for process reengineering. Ph.D thesis. University of Toronto, Canada (1996) Yu, E.: Modelling strategic relationships for process reengineering. Ph.D thesis. University of Toronto, Canada (1996)
Metadaten
Titel
Privacy-Aware Trust Negotiation
verfasst von
Ruben Rios
Carmen Fernandez-Gago
Javier Lopez
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-46598-2_7