【24h】

Designing Security Requirements Models Through Planning

机译:通过计划设计安全需求模型

获取原文
获取原文并翻译 | 示例

摘要

The quest for designing secure and trusted software has led to refined Software Engineering methodologies that rely on tools to support the design process. Automated reasoning mechanisms for requirements and software verification are by now a well-accepted part of the design process, and model driven architectures support the automation of the refinement process. We claim that we can further push the envelope towards the automatic exploration and selection among design alternatives and show that this is concretely possible for Secure Tropos, a requirements engineering methodology that addresses security and trust concerns. In Secure Tropos, a design consists of a network of actors (agents, positions or roles) with delegation/permission dependencies among them. Accordingly, the generation of design alternatives can be accomplished by a planner which is given as input a set of actors and goals and generates alternative multi-agent plans to fulfill all given goals. We validate our claim with a case study using a state-of-the-art planner.
机译:对设计安全可靠的软件的追求导致了完善的软件工程方法论,这些方法论依靠工具来支持设计过程。到目前为止,用于需求和软件验证的自动化推理机制已成为设计过程中公认的一部分,并且模型驱动的体系结构支持精炼过程的自动化。我们声称,我们可以进一步推动设计替代方案之间的自动探索和选择,并表明这对于Secure Tropos是切实可行的,Secure Tropos是一种解决安全和信任问题的需求工程方法。在Secure Tropos中,设计由参与者(代理,职位或角色)网络组成,参与者之间具有委派/权限依赖性。因此,设计替代方案的生成可以由计划者完成,该计划者被输入一组参与者和目标作为输入,并生成替代性多主体计划以实现所有给定目标。我们使用最先进的计划程序通过案例研究验证了我们的主张。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号