The security twin peaks

  • Authors:
  • Thomas Heyman;Koen Yskout;Riccardo Scandariato;Holger Schmidt;Yijun Yu

  • Affiliations:
  • IBBT, DistriNet, Katholieke Universiteit Leuven, Belgium;IBBT, DistriNet, Katholieke Universiteit Leuven, Belgium;IBBT, DistriNet, Katholieke Universiteit Leuven, Belgium;Technische Universität Dortmund, Germany;Open University, United Kingdom

  • Venue:
  • ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

The feedback from architectural decisions to the elaboration of requirements is an established concept in the software engineering community. However, pinpointing the nature of this feedback in a precise way is a largely open problem. Often, the feedback is generically characterized as additional qualities that might be affected by an architect's choice. This paper provides a practical perspective on this problem by leveraging architectural security patterns. The contribution of this paper is the Security Twin Peaks model, which serves as an operational framework to co-develop security in the requirements and the architectural artifacts.