2015
DOI: 10.1007/s00766-015-0229-z
|View full text |Cite
|
Sign up to set email alerts
|

Automating trade-off analysis of security requirements

Abstract: A key aspect of engineering secure systems is identifying adequate security requirements to protect critical assets from harm. However, security requirements may compete with other requirements such as cost and usability. For this reason, they may only be satisfied partially and must be traded off against other requirements to achieve ''good-enough security''. This paper proposes a novel approach to automate security requirements analysis in order to determine maximum achievable satisfaction level for security… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
3
3

Relationship

1
8

Authors

Journals

citations
Cited by 22 publications
(6 citation statements)
references
References 36 publications
0
6
0
Order By: Relevance
“…Saadatmand et al [64] propose an approach that automatically, based on a fuzzy logic extension of the TOPSIS decision-making method, analyzes UML class models annotated with non-functional requirements in order to evaluate different design alternatives and identify which one leads to better overall satisfaction of non-functional requirements. For the same purpose, Pasquale et al [52] propose to use the KAOS goal-oriented approach to study interactions between security requirements such as confidentiality and other organizational and non-functional requirements such as cost budget and performance, respectively. The proposed approach uses a SMT solver to interpret the KAOS models and automate the execution of the trade-off analyses.…”
Section: Model-based Conflict Detection Approachesmentioning
confidence: 99%
“…Saadatmand et al [64] propose an approach that automatically, based on a fuzzy logic extension of the TOPSIS decision-making method, analyzes UML class models annotated with non-functional requirements in order to evaluate different design alternatives and identify which one leads to better overall satisfaction of non-functional requirements. For the same purpose, Pasquale et al [52] propose to use the KAOS goal-oriented approach to study interactions between security requirements such as confidentiality and other organizational and non-functional requirements such as cost budget and performance, respectively. The proposed approach uses a SMT solver to interpret the KAOS models and automate the execution of the trade-off analyses.…”
Section: Model-based Conflict Detection Approachesmentioning
confidence: 99%
“…Automation in ISRM is researched from different perspectives. An approach to automatically identify adequate security requirements based on an asset model of the system under investigation has been presented by Pasquale et al (2016). Adaptive ISRM approaches enhance support for dealing with changes of assets as well the threat landscape (Bennaceur et al, 2014).…”
Section: Information Security Risk Managementmentioning
confidence: 99%
“…The work of Pasquale et al (2015) introduces a requirements-driven approach for automated and quantitative security trade-off analysis through a sophisticated optimisation algorithm. Similarly, Aydemir et al (2016) propose a multiobjective, goal-oriented, risk modelling and analysis framework, which is based on constrained goal models and uses OptiMathSAT to identify optimal security countermeasures.…”
Section: Related Workmentioning
confidence: 99%