Modeling and analysis of security trade-offs - A goal oriented approach

被引:15
|
作者
Elahi, Golnaz [1 ]
Yu, Eric [2 ]
机构
[1] Univ Toronto, Dept Comp Sci, Toronto, ON M5S 1A4, Canada
[2] Univ Toronto, Fac Informat, Toronto, ON M5S 3G6, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Security trade-offs; Trade-off analysis; Conceptual modeling; Goal modeling; Goal model evaluation; REQUIREMENTS;
D O I
10.1016/j.datak.2009.02.004
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In designing software systems, security is typically only one design objective among many. It may compete with other objectives such as functionality, usability, and performance. Too often, security mechanisms such as firewalls, access control, or encryption are adopted without explicit recognition of competing design objectives and their origins in stakeholders' interests. Recently, there is increasing acknowledgement that security is ultimately about trade-offs. One can only aim for "good enough" security, given the competing demands from many parties. This paper investigates the criteria for a conceptual modeling technique for making security trade-offs. We examine how conceptual modeling can provide explicit and systematic support for modeling and analyzing security trade-offs. We examine several existing approaches for dealing with trade-offs and security trade-offs in particular. From analyzing the limitations of existing methods, we propose an extension to the i* Framework for security trade-off analysis, taking advantage of its multi-agent and goal orientation. The method was applied to several case studies used to exemplify existing approaches. The resulting models developed using different approaches are compared. (c) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:579 / 598
页数:20
相关论文
共 50 条
  • [1] A goal oriented approach for Modeling and analyzing security trade-offs
    Elahi, Golnaz
    Yu, Eric
    [J]. CONCEPTUAL MODELING - ER 2007, PROCEEDINGS, 2007, 4801 : 375 - +
  • [2] Modeling and Analyzing Openness Trade-Offs in Software Platforms: A Goal-Oriented Approach
    Sadi, Mahsa H.
    Yu, Eric
    [J]. REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY, REFSQ 2017, 2017, 10153 : 33 - 49
  • [3] The psychological trade-offs of goal investment
    Pomerantz, EM
    Saxon, JL
    Oishi, S
    [J]. JOURNAL OF PERSONALITY AND SOCIAL PSYCHOLOGY, 2000, 79 (04) : 617 - 630
  • [4] Security threat modeling and analysis: A goal-oriented approach
    Oladimeji, Ebenezer A.
    Supakkul, Sam
    Chung, Lawrence
    [J]. PROCEEDINGS OF THE 10TH IASTED INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND APPLICATIONS, 2006, : 178 - 185
  • [5] Assessing Deontic Trade-offs: A Conjoint Analysis Approach
    Pai, Chen-Kuo
    Lee, Ronald
    Seaton, Bruce
    Hinds, David
    Xia, Weidong
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (07) : 1771 - 1776
  • [6] Budgetary trade-offs of security expenditures in Turkey
    Günlük-Senesen, G
    [J]. DEFENCE AND PEACE ECONOMICS, 2002, 13 (05) : 385 - 403
  • [7] Investments and Trade-offs in the Economics of Information Security
    Ioannidis, Christos
    Pym, David
    Williams, Julian
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2009, 5628 : 148 - +
  • [8] Privatizing Social Security: The troubling trade-offs
    Burtless, G
    Bosworth, B
    [J]. WASHINGTON QUARTERLY, 1999, 22 (01): : 205 - 215
  • [9] Blockchain Interoperability: Performance and Security Trade-offs
    Pillai, Babu
    Hou, Zhe
    Biswas, Kamanashis
    Bui, Vinh
    Muthukkumarasamy, Vallipuram
    [J]. PROCEEDINGS OF THE TWENTIETH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, SENSYS 2022, 2022, : 1196 - 1201
  • [10] Security Trade-offs in Microfluidic Routing Fabrics
    Tang, Jack
    Ibrahim, Mohamed
    Chakrabarty, Krishnendu
    Karri, Ramesh
    [J]. 2017 IEEE 35TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2017, : 25 - 32