A goal oriented approach for Modeling and analyzing security trade-offs

被引:0
|
作者
Elahi, Golnaz [1 ]
Yu, Eric [1 ]
机构
[1] Univ Toronto, Fac Informat Studies, Toronto, ON M5S 3G6, Canada
关键词
security trade-offs; trade-off analysis; goal modeling; goal model evaluation;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In designing software systems, security is typically only one design objective among many. It may compete with other objectives such as functionality, usability, and performance. Too often, security mechanisms such as firewalls, access control, or encryption are adopted without explicit recognition of competing design objectives and their origins in stakeholder interests. Recently, there is increasing acknowledgement that security is ultimately about trade-offs. One can only aim for "good enough" security, given the competing demands from many parties. In this paper, we examine how conceptual modeling can provide explicit and systematic support for analyzing security trade-offs. After considering the desirable criteria for conceptual modeling methods, we examine several existing approaches for dealing with security trade-offs. From analyzing the limitations of existing methods, we propose an extension to the i* framework for security trade-off analysis, taking advantage of its multi-agent and goal orientation. The method was applied to several case studies used to exemplify existing approaches.
引用
收藏
页码:375 / +
页数:4
相关论文
共 50 条
  • [1] Modeling and analysis of security trade-offs - A goal oriented approach
    Elahi, Golnaz
    Yu, Eric
    [J]. DATA & KNOWLEDGE ENGINEERING, 2009, 68 (07) : 579 - 598
  • [2] Modeling and Analyzing Openness Trade-Offs in Software Platforms: A Goal-Oriented Approach
    Sadi, Mahsa H.
    Yu, Eric
    [J]. REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY, REFSQ 2017, 2017, 10153 : 33 - 49
  • [3] Sustainable development goal indicators: Analyzing trade-offs and complementarities
    Barbier, Edward B.
    Burgess, Joanne C.
    [J]. WORLD DEVELOPMENT, 2019, 122 : 295 - 305
  • [4] The psychological trade-offs of goal investment
    Pomerantz, EM
    Saxon, JL
    Oishi, S
    [J]. JOURNAL OF PERSONALITY AND SOCIAL PSYCHOLOGY, 2000, 79 (04) : 617 - 630
  • [5] Systems methods for analyzing trade-offs between food security and conserving biodiversity
    Stuch B.
    Alcamo J.
    [J]. Environment Systems and Decisions, 2024, 44 (1) : 16 - 29
  • [6] TECHNIQUE FOR ANALYZING INACCURATELY ESTIMATED TRADE-OFFS
    BAIRD, CW
    [J]. REVIEW OF SOCIAL ECONOMY, 1970, 28 (02) : 173 - 178
  • [7] AuthGuide: Analyzing Security, Privacy and Usability Trade-Offs in Multi-factor Authentication
    Preuveneers, Davy
    Joos, Sander
    Joosen, Wouter
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS (TRUSTBUS 2021), 2021, 12927 : 155 - 170
  • [8] Budgetary trade-offs of security expenditures in Turkey
    Günlük-Senesen, G
    [J]. DEFENCE AND PEACE ECONOMICS, 2002, 13 (05) : 385 - 403
  • [9] Investments and Trade-offs in the Economics of Information Security
    Ioannidis, Christos
    Pym, David
    Williams, Julian
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2009, 5628 : 148 - +
  • [10] Security Trade-offs in Microfluidic Routing Fabrics
    Tang, Jack
    Ibrahim, Mohamed
    Chakrabarty, Krishnendu
    Karri, Ramesh
    [J]. 2017 IEEE 35TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2017, : 25 - 32