IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Organizational Patterns for Security and Dependability: From Design to Application

Organizational Patterns for Security and Dependability: From Design to Application
View Sample PDF
Author(s): Yudis Asnar (University of Trento, Italy), Fabio Massacci (University of Trento, Italy), Ayda Saidane (University of Trento, Italy), Carlo Riccucci (Engineering Ingegneria Informatica S.p.A, Italy), Massimo Felici (Deep Blue, Italy), Alessandra Tedeschi (Deep Blue, Italy), Paul El-Khoury (SAP Research, France), Keqin Li (SAP Research, France), Magali Séguran (SAP Research, France)and Nicola Zannone (Eindhoven University of Technology, The Netherlands)
Copyright: 2013
Pages: 21
Source title: Developing and Evaluating Security-Aware Software Systems
Source Author(s)/Editor(s): Khaled M. Khan (Qatar University, Qatar)
DOI: 10.4018/978-1-4666-2482-5.ch004

Purchase

View Organizational Patterns for Security and Dependability: From Design to Application on the publisher's website for pricing and purchasing information.

Abstract

Designing secure and dependable IT systems requires a deep analysis of organizational as well as social aspects of the environment where the system will operate. Domain experts and analysts often face security and dependability (S&D) issues they have already encountered before. These concerns require the design of S&D patterns to facilitate designers when developing IT systems. This article presents the experience in designing S&D organizational patterns, which was gained in the course of an industry lead EU project. The authors use an agent-goal-oriented modeling framework (i.e., the SI* framework) to analyze organizational settings jointly with technical functionalities. This framework can assist domain experts and analysts in designing S&D patterns from their experience, validating them by proof-of-concept implementations, and applying them to increase the security level of the system.

Related Content

Babita Srivastava. © 2024. 21 pages.
Sakuntala Rao, Shalini Chandra, Dhrupad Mathur. © 2024. 27 pages.
Satya Sekhar Venkata Gudimetla, Naveen Tirumalaraju. © 2024. 24 pages.
Neeta Baporikar. © 2024. 23 pages.
Shankar Subramanian Subramanian, Amritha Subhayan Krishnan, Arumugam Seetharaman. © 2024. 35 pages.
Charu Banga, Farhan Ujager. © 2024. 24 pages.
Munir Ahmad. © 2024. 27 pages.
Body Bottom