A goal oriented approach for modeling and analyzing security trade-offs

  • Authors:
  • Golnaz Elahi;Eric Yu

  • Affiliations:
  • Department of Computer Science, University of Toronto, Canada;Faculty of Information Studies, University of Toronto, Canada

  • Venue:
  • ER'07 Proceedings of the 26th international conference on Conceptual modeling
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In designing software systems, security is typically only one design objective among many. It may compete with other objectives such as functionality, usability, and performance. Too often, security mechanisms such as firewalls, access control, or encryption are adopted without explicit recognition of competing design objectives and their origins in stakeholder interests. Recently, there is increasing acknowledgement that security is ultimately about trade-offs. One can only aim for "good enough" security, given the competing demands from many parties. In this paper, we examine how conceptual modeling can provide explicit and systematic support for analyzing security trade-offs. After considering the desirable criteria for conceptual modeling methods, we examine several existing approaches for dealing with security trade-offs. From analyzing the limitations of existing methods, we propose an extension to the i* framework for security trade-off analysis, taking advantage of its multi-agent and goal orientation. The method was applied to several case studies used to exemplify existing approaches.