A goal oriented approach for Modeling and analyzing security trade-offs

被引:0
|
作者
Elahi, Golnaz [1 ]
Yu, Eric [1 ]
机构
[1] Univ Toronto, Fac Informat Studies, Toronto, ON M5S 3G6, Canada
关键词
security trade-offs; trade-off analysis; goal modeling; goal model evaluation;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In designing software systems, security is typically only one design objective among many. It may compete with other objectives such as functionality, usability, and performance. Too often, security mechanisms such as firewalls, access control, or encryption are adopted without explicit recognition of competing design objectives and their origins in stakeholder interests. Recently, there is increasing acknowledgement that security is ultimately about trade-offs. One can only aim for "good enough" security, given the competing demands from many parties. In this paper, we examine how conceptual modeling can provide explicit and systematic support for analyzing security trade-offs. After considering the desirable criteria for conceptual modeling methods, we examine several existing approaches for dealing with security trade-offs. From analyzing the limitations of existing methods, we propose an extension to the i* framework for security trade-off analysis, taking advantage of its multi-agent and goal orientation. The method was applied to several case studies used to exemplify existing approaches.
引用
收藏
页码:375 / +
页数:4
相关论文
共 50 条
  • [21] Trade-Offs in Continuous Integration: Assurance, Security, and Flexibility
    Hilton, Michael
    Nelson, Nicholas
    Tunnell, Timothy
    Marinov, Darko
    Dig, Danny
    [J]. ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING, 2017, : 197 - 207
  • [22] Trade-offs
    Garland, Theodore, Jr.
    [J]. CURRENT BIOLOGY, 2014, 24 (02) : R60 - R61
  • [23] Information security trade-offs and optimal patching policies
    Ioannidis, Christos
    Pym, David
    Williams, Julian
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2012, 216 (02) : 434 - 444
  • [24] Security and Efficiency Trade-offs for Cloud Computing and Storage
    Li, Jian
    Zhou, Kai
    Ren, Jian
    [J]. 2015 RESILIENCE WEEK (RSW), 2015, : 148 - 153
  • [25] Biodiversity and food security: from trade-offs to synergies
    Wolfgang Cramer
    Emilie Egea
    Joern Fischer
    Alexandra Lux
    Jean-Michel Salles
    Josef Settele
    Muriel Tichit
    [J]. Regional Environmental Change, 2017, 17 : 1257 - 1259
  • [26] Modeling microbial metabolic trade-offs in a chemostat
    Li, Zhiyuan
    Liu, Bo
    Li, Sophia Hsin-Jung
    King, Christopher G.
    Gitai, Zemer
    Wingreen, Ned S.
    [J]. PLOS COMPUTATIONAL BIOLOGY, 2020, 16 (08)
  • [27] Biodiversity and food security: from trade-offs to synergies
    Cramer, Wolfgang
    Egea, Emilie
    Fischer, Joern
    Lux, Alexandra
    Salles, Jean-Michel
    Settele, Josef
    Tichit, Muriel
    [J]. REGIONAL ENVIRONMENTAL CHANGE, 2017, 17 (05) : 1257 - 1259
  • [28] Security threat modeling and analysis: A goal-oriented approach
    Oladimeji, Ebenezer A.
    Supakkul, Sam
    Chung, Lawrence
    [J]. PROCEEDINGS OF THE 10TH IASTED INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND APPLICATIONS, 2006, : 178 - 185
  • [29] Debate: Public value trade-offs and methodological trade-offs
    Bozeman, Barry
    [J]. PUBLIC MONEY & MANAGEMENT, 2008, 28 (03) : 135 - 136
  • [30] Managing Security Trade-offs in the Internet of Things Using Adaptive Security
    Aman, Waqas
    Snekkenes, Einar
    [J]. 2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 362 - 368