Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where José Luis Vivas is active.

Publication


Featured researches published by José Luis Vivas.


database and expert systems applications | 2003

A business process-driven approach to security engineering

Antonio Maña; Jose A. Montenegro; Carsten Rudolph; José Luis Vivas

A challenging task in security engineering concerns the specification and integration of security with other requirements at the top level of requirements engineering. Empirical studies show that it is common that end users are able to express their security needs at the business process level. Since many security requirements originate at this level, it is natural to try to capture and express them within the context of business models where end users feel most comfortable and where they conceptually belong. In this paper, we develop these views, present an ongoing work intended to create a UML-based and business process-driven framework for the development of security-critical systems and propose an approach to a rigorous treatment of security requirements supported by formal methods.


Computer Standards & Interfaces | 2005

Specification and design of advanced authentication and authorization services

Javier Lopez; Jose A. Montenegro; José Luis Vivas; Eiji Okamoto; Ed Dawson

A challenging task in security engineering concerns the specification and integration of security with other requirements at the top level of requirements engineering. Empirical studies show that it is common at the business process level that customers and end users are able to express their security needs. Among the security needs of Internet applications, authentication and authorization services are outstanding and, sometimes, privacy becomes a parallel requirement. In this paper, we introduce a methodology for the specification of security requirements and use a case study to apply our solution. We further detail the resulting system after extending it with an Authentication and Authorization Infrastructure.


international conference on information security | 2003

Towards a Business Process-Driven Framework for Security Engineering with the UML

José Luis Vivas; Jose A. Montenegro; Javier Lopez

A challenging task in security engineering concerns the specification and integration of security with other requirements at the top level of requirements engineering. Empirical studies show that it is commonly at the business process level that customers and end users are able to express their security needs. In addition, systems are often developed by automating existing manual business processes. Since many security notions belongs conceptually to the world of business processes, it is natural to try to capture and express them in the context of business models in which moreover customers and end users feel most comfortable. In this paper, based on experience drawn from an ongoing work within the CASENET project [1], we propose a UML-based business process-driven framework for the development of security-critical systems.


Requirements Engineering | 2011

A methodology for security assurance-driven system development

José Luis Vivas; Isaac Agudo; Javier Lopez

In this work, we introduce an assurance methodology that integrates assurance case creation with system development. It has been developed in order to provide trust and privacy assurance to the evolving European project PICOS (Privacy and Identity Management for Community Services), an international research project focused on mobile communities and community-supporting services, with special emphasis on aspects such as privacy, trust, and identity management. The leading force behind the approach is the ambition to develop a methodology for building and maintaining security cases throughout the system development life cycle in a typical system engineering effort, when much of the information relevant for assurance is produced and feedback can be provided to system developers. The first results of the application of the methodology to the development of the PICOS platform are presented.


Electronic Notes in Theoretical Computer Science | 2002

Dynamic Channel Screening in the Higher Order π-Calculus

José Luis Vivas; Nobuko Yoshida

Recently programming languages have been designed to support mobile code, i.e. higher-order code that is transferred from a remote location or domain and executed within the local environment. This may expose the internal interfaces and objects within a location to attacks by mobile code. In this work, we propose an extension of notations based on the Higher-Order π-calculus with primitive operators, called screening operators, whose role is to protect internal interfaces by dynamically restricting the visibility of channels. The usefulness of these operators is illustrated by applications involving resource access control. We show how restrictions on resource access control can be enforced dynamically in terms of screening operators, and contrast it with an alternative approach in which restrictions on the behaviour of processes are based on the notion of process type [17] and intended to be checked statically.


Computer Standards & Interfaces | 2010

A security framework for a workflow-based grid development platform

José Luis Vivas; Carmen Fernandez-Gago; Javier Lopez; Andrés Benjumea

This paper describes the security framework that is to be developed for the generic grid platform created for the project GREDIA. This platform is composed of several components that need to be secured. The platform uses the OGSA standards, so that the security framework will follow GSI, the portion of Globus that implements security. Thus, we will show the security features that GSI already provides and we will outline which others need to be created or enhanced.


computer systems and technologies | 2009

Security assurance during the software development cycle

Isaac Agudo; José Luis Vivas; Javier Lopez

Assurance has been a major topic for critical systems. Assurance is usually associated with safety conditions but has also an important role for checking security requirements. Security is best assured if it is addressed holistically, systematically, and from the very beginning in the softwares development process. We propose to integrate assurance and system development by letting the different stages of the system development life-cycle be mapped to the structure of the assurance case.


international conference on communications | 2003

How to Specify Security Services: A Practical Approach

Javier Lopez; Juan J. Ortega; José Luis Vivas; José M. Troya

Security services are essential for ensuring secure communications. Typically no consideration is given to security requirements during the initial stages of system development. Security is only added latter as an afterthought in function of other factors such as the environment into which the system is to be inserted, legal requirements, and other kinds of constraints. In this work we introduce a methodology for the specification of security requirements intended to assist developers in the design, analysis, and implementation phases of protocol development. The methodology consists of an extension of the ITU-T standard requirements language MSC and HMSC, called SRSL, defined as a high level language for the specification of security protocols. In order to illustrate it and evaluate its power, we apply the new methodology to a real world example, the integration of an electronic notary system into a web-based multi-users service platform.


Security in Distributed, Grid, Mobile, and Pervasive Computing | 2007

Grid Security Architecture: Requirements, Fundamentals, Standards and Models

José Luis Vivas; Jose A. Montenegro; Javier Lopez; Y. Xiao


Faculty of Science and Technology; Information Security Institute | 2005

Specification and Design of Advanced Authentication and Authorisation Services

Ed Dawson; Javier Lopez; Jose A. Montenegro; Eiji Okamoto; José Luis Vivas

Collaboration


Dive into the José Luis Vivas's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ed Dawson

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge