Filling the gap between requirements engineering and public key/trust management infrastructures

14Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The last years have seen a major interest in designing and deploying trust management and public key infrastructures. Yet, it is still far from clear how one can pass from the organization and system requirements to the actual credentials and attribution of permissions in the PKI infrastructure. Our goal in this paper is filling this gap. We propose a formal framework for modeling and analyzing security and trust requirements, that extends the Tropos methodology for early requirements modeling. The key intuition that underlies our work is the identification of distinct roles for actors that manipulate resources, accomplish goals or execute tasks, and actors that own or permit usage of resources or goals. The paper also presents a simple case study and a PKI/trust management implementation. © Springer-Verlag Berlin Heidelberg 2004.

Cite

CITATION STYLE

APA

Giorgini, P., Massacci, F., Mylopoulos, J., & Zannone, N. (2004). Filling the gap between requirements engineering and public key/trust management infrastructures. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3093, 98–111. https://doi.org/10.1007/978-3-540-25980-0_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free