Automating trade-off analysis of security requirements

被引:16
作者
Pasquale, Liliana [1 ]
Spoletini, Paola [2 ]
Salehie, Mazeiar [1 ]
Cavallaro, Luca [1 ]
Nuseibeh, Bashar [1 ,3 ]
机构
[1] Univ Limerick, Lero, Limerick, Ireland
[2] Kennesaw State Univ, Dept Software Engn & Game Dev, Marietta, GA 30144 USA
[3] Open Univ, Dept Comp, Milton Keynes, Bucks, England
关键词
Security requirements; Trade-off analysis; Goals;
D O I
10.1007/s00766-015-0229-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A key aspect of engineering secure systems is identifying adequate security requirements to protect critical assets from harm. However, security requirements may compete with other requirements such as cost and usability. For this reason, they may only be satisfied partially and must be traded off against other requirements to achieve "good-enough security". This paper proposes a novel approach to automate security requirements analysis in order to determine maximum achievable satisfaction level for security requirements and identify trade-offs between security and other requirements. We also propose a pruning algorithm to reduce the search space size in the analysis. We represent security concerns and requirements using asset, threat, and goal models, initially proposed in our previous work. To deal with uncertainty and partial requirements, satisfaction security concerns are quantified by leveraging the notion of composite indicators, which are computed through metric functions based on range normalisation. An SMT solver (Z3) interprets the models and automates the execution of our analyses. We illustrate and evaluate our approach by applying it to a substantive example of a service-based application for exchanging emails.
引用
收藏
页码:481 / 504
页数:24
相关论文
共 43 条
  • [1] Evaluating Goal Models within the Goal-Oriented Requirement Language
    Amyot, Daniel
    Ghanavati, Sepideh
    Horkoff, Jennifer
    Mussbacher, Gunter
    Peyton, Liam
    Yu, Eric
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2010, 25 (08) : 841 - 877
  • [2] [Anonymous], 2008, 1333512004 ISOIEC
  • [3] [Anonymous], SELECTED WORKS J LUK
  • [4] Goal-driven risk assessment in requirements engineering
    Asnar, Yudistira
    Giorgini, Paolo
    Mylopoulos, John
    [J]. REQUIREMENTS ENGINEERING, 2011, 16 (02) : 101 - 116
  • [5] Barone D, 2011, LECT NOTES BUS INF P, V92, P82
  • [6] Boehm B., 1994, Proceedings of the First International Conference on Requirements Engineering (Cat. No.94TH0613-0), P74, DOI 10.1109/ICRE.1994.292400
  • [7] Assessing requirements-related risks through probabilistic goals and obstacles
    Cailliau, Antoine
    van Lamsweerde, Axel
    [J]. REQUIREMENTS ENGINEERING, 2013, 18 (02) : 129 - 146
  • [8] Z3: An efficient SMT solver
    de Moura, Leonardo
    Bjorner, Nikolaj
    [J]. TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 2008, 4963 : 337 - 340
  • [9] Elahi G, 2007, LECT NOTES COMPUT SC, V4801, P375
  • [10] A broad, quantitative model for making early requirements decisions
    Feather, Martin S.
    Cornford, Steven L.
    Hicks, Kenneth A.
    Kiper, James D.
    Menzies, Tim
    [J]. IEEE SOFTWARE, 2008, 25 (02) : 49 - 56