Automating trade-off analysis of security requirements

被引:16
作者
Pasquale, Liliana [1 ]
Spoletini, Paola [2 ]
Salehie, Mazeiar [1 ]
Cavallaro, Luca [1 ]
Nuseibeh, Bashar [1 ,3 ]
机构
[1] Univ Limerick, Lero, Limerick, Ireland
[2] Kennesaw State Univ, Dept Software Engn & Game Dev, Marietta, GA 30144 USA
[3] Open Univ, Dept Comp, Milton Keynes, Bucks, England
关键词
Security requirements; Trade-off analysis; Goals;
D O I
10.1007/s00766-015-0229-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A key aspect of engineering secure systems is identifying adequate security requirements to protect critical assets from harm. However, security requirements may compete with other requirements such as cost and usability. For this reason, they may only be satisfied partially and must be traded off against other requirements to achieve "good-enough security". This paper proposes a novel approach to automate security requirements analysis in order to determine maximum achievable satisfaction level for security requirements and identify trade-offs between security and other requirements. We also propose a pruning algorithm to reduce the search space size in the analysis. We represent security concerns and requirements using asset, threat, and goal models, initially proposed in our previous work. To deal with uncertainty and partial requirements, satisfaction security concerns are quantified by leveraging the notion of composite indicators, which are computed through metric functions based on range normalisation. An SMT solver (Z3) interprets the models and automates the execution of our analyses. We illustrate and evaluate our approach by applying it to a substantive example of a service-based application for exchanging emails.
引用
收藏
页码:481 / 504
页数:24
相关论文
共 43 条
  • [41] Wunder J, 2011, 7693 NIST
  • [42] A systematic tradeoff analysis for conflicting imprecise requirements
    Yen, J
    Tiao, WA
    [J]. RE '97 - PROCEEDINGS OF THE THIRD IEEE INTERNATIONAL SYMPOSIUM ON REQUIREMENTS ENGINEERING, 1997, : 87 - 96
  • [43] FUZZY SETS
    ZADEH, LA
    [J]. INFORMATION AND CONTROL, 1965, 8 (03): : 338 - &