@inproceedings{oai:soar-ir.repo.nii.ac.jp:00013273, author = {Kaiya, H and Sasaki, K and Kaijiri, K}, book = {Proceedings : the Sixth International Conference on Quality Software}, month = {Oct}, note = {QSIC 2006, Beijing, China, Oct. 2006, Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for the system before they use the system. Especially, they should be very careful when they use a system with components and/or services provided by third parties. However, there are few methods or tools to learn and confirm such issues. In this paper, we present a supporting tool called “PORTAM” for such users and providers to understand the threats and the requirements. Suppose some requirements cannot be satisfied when some threats are avoided, and vice versa. In such cases, they should decide whether the requirements should be satisfied or the threats should be avoided. The tool also helps them to decide such kinds of trade-offs. Current version of this tool handles Java mobile code applications, thus users of our tool can easily feel real threats. Although the current version deals only with Java components, the ideas behind the tool can be applied to software in general. We finally report experimental results to confirm the usefulness and the educational effects of this tool., Article, Proceedings : the Sixth International Conference on Quality Software. 125-132 (2006)}, pages = {125--132}, publisher = {IEEE Computer Society}, title = {PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application}, year = {2006} }