Designing Security Requirements Models Through Planning

The quest for designing secure and trusted software has led to refined Software Engineering methodologies that rely on tools to support the design process. Automated reasoning mechanisms for requirements and software verification are by now a well-accepted part of the design process, and model driven architectures support the automation of the refinement process. We claim that we can further push the envelope towards the automatic exploration and selection among design alternatives and show that this is concretely possible for Secure Tropos, a requirements engineering methodology that addresses security and trust concerns. In Secure Tropos, a design consists of a network of actors (agents, positions or roles) with delegation/permission dependencies among them. Accordingly, the generation of design alternatives can be accomplished by a planner which is given as input a set of actors and goals and generates alternative multi-agent plans to fulfill all given goals. We validate our claim with a case study using a state-of-the-art planner.

[1]  John Mylopoulos,et al.  Modeling security requirements through ownership, permission and delegation , 2005, 13th IEEE International Conference on Requirements Engineering (RE'05).

[2]  Daniel S. Weld Recent Advances in AI Planning , 1999, AI Mag..

[3]  Steve Roach,et al.  Automated Procedure Construction for Deductive Synthesis , 2005, Automated Software Engineering.

[4]  Michael J. Gallivan,et al.  Striking a balance between trust and control in a virtual organization: a content analysis of open source software case studies , 2001, Inf. Syst. J..

[5]  Peter F. Drucker,et al.  Managing the Non-Profit Organization: Principles and Practices , 1992 .

[6]  Axel van Lamsweerde,et al.  From system goals to intruder anti-goals: attack generation and resolution for security requirements engineering , 2003 .

[7]  Joachim Peer,et al.  Web Service Composition as AI Planning { a Survey ⁄ , 2005 .

[8]  Fabio Massacci,et al.  Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation , 2005, Comput. Stand. Interfaces.

[9]  Enn Tyugu,et al.  Strategies of Structural Synthesis of Programs and its Extensions , 2001, Comput. Artif. Intell..

[10]  John Mylopoulos,et al.  Modeling Social and Individual Trust in Requirements Engineering Methodologies , 2005, iTrust.

[11]  Hector J. Levesque,et al.  ConGolog, a concurrent programming language based on the situation calculus , 2000, Artif. Intell..

[12]  B. Hillebrand,et al.  Trust, Contract and Relationship Development , 2005 .

[13]  John Mylopoulos,et al.  Towards requirements-driven information systems engineering: the Tropos project , 2002, Inf. Syst..

[14]  Rocco Moretti,et al.  Model Driven Architecture (MDA) , 2007 .

[15]  W. Hamilton,et al.  The evolution of cooperation. , 1984, Science.

[16]  Avrim Blum,et al.  Fast Planning Through Planning Graph Analysis , 1995, IJCAI.

[17]  Herbert A. Simon,et al.  The Sciences of the Artificial , 1970 .

[18]  Bashar Nuseibeh,et al.  Using trust assumptions with security requirements , 2005, Requirements Engineering.

[19]  N. Luhmann Trust and Power , 1979 .

[20]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[21]  John Mylopoulos,et al.  Requirements Analysis for Socio-technical Systems: Exploring and Evaluating Alternatives , 2006 .

[22]  Axel van Lamsweerde,et al.  Reasoning about partial goal satisfaction for requirements and design engineering , 2004, SIGSOFT '04/FSE-12.

[23]  Thomas Ellman Specification and synthesis of hybrid automata for physics-based animation , 2004, Automated Software Engineering.

[24]  Ketil Stølen,et al.  What is model driven architecture , 2003 .

[25]  Andreas L. Opdahl,et al.  Eliciting security requirements with misuse cases , 2004, Requirements Engineering.

[26]  Bart Selman,et al.  Planning as Satisfiability , 1992, ECAI.

[27]  Craig A. Knoblock,et al.  PDDL-the planning domain definition language , 1998 .

[28]  Zohar Manna,et al.  A Deductive Approach to Program Synthesis , 1979, TOPL.

[29]  John P. McDermott,et al.  Using abuse case models for security requirements analysis , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).

[30]  Lin Liu,et al.  Modelling Trust for System Design Using the i* Strategic Actors Framework , 2000, Trust in Cyber-societies.

[31]  Ralph Johnson,et al.  design patterns elements of reusable object oriented software , 2019 .

[32]  W. Hamilton,et al.  The Evolution of Cooperation , 1984 .

[33]  Craig A. Knoblock,et al.  Web service composition as planning , 2003 .

[34]  James L. Caldwell,et al.  Moving proofs-as-programs into practice , 1997, Proceedings 12th IEEE International Conference Automated Software Engineering.

[35]  G. Lakemeyer,et al.  Modeling the Impact of Trust and Distrust in Agent Networks , 2022 .