Requirements engineering for trust management: model, methodology, and reasoning Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone International Journal of Information Security Issue Volume 5, Number 4 / October, 2006 DOI 10.1007/s10207-006-0005-7 Pages 257-274 Abstract A number of recent proposals aim to incorporate security engineering into mainstream software engineering. Yet, capturing trust and security requirements at an organizational level, as opposed to an IT system level, and mapping these into security and trust management policies is still an open problem. This paper proposes a set of concepts founded on the notions of ownership, permission, and trust and intended for requirements modeling. It also extends Tropos, an agent-oriented software engineering methodology, to support security requirements engineering. These concepts are formalized and are shown to support the automatic verification of security and trust requirements using Datalog. To make the discussion more concrete, we illustrate the proposal with a Health Care case study. Keywords Requirements Engineering - Agent-oriented software - Security Engineering - Trust models for business and organizations - Verification and validation of software - Privilege management This work is an expanded and revised version of [19,20].