Filling the gap between requirements engineering and public key/trust management infrastructures

P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    14 Citaten (Scopus)
    4 Downloads (Pure)


    The last years have seen a major interest in designing and deploying trust management and public key infrastructures. Yet, it is still far from clear how one can pass from the organization and system requirements to the actual credentials and attribution of permissions in the PKI infrastructure. Our goal in this paper is filling this gap. We propose a formal framework for modeling and analyzing security and trust requirements, that extends the Tropos methodology for early requirements modeling. The key intuition that underlies our work is the identification of distinct roles for actors that manipulate resources, accomplish goals or execute tasks, and actors that own or permit usage of resources or goals. The paper also presents a simple case study and a PKI/trust management implementation.
    Originele taal-2Engels
    TitelPublic Key Infrastructure (First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings)
    RedacteurenS.K. Katsikas, S. Gritzalis, J. Lopez
    Plaats van productieBerlin
    ISBN van geprinte versie3-540-22216-2
    StatusGepubliceerd - 2004

    Publicatie series

    NaamLecture Notes in Computer Science
    ISSN van geprinte versie0302-9743

    Vingerafdruk Duik in de onderzoeksthema's van 'Filling the gap between requirements engineering and public key/trust management infrastructures'. Samen vormen ze een unieke vingerafdruk.

    Citeer dit