Security Design Based on Social Modeling

  • Authors:
  • Lin Liu;Eric Yu;John Mylopoulos

  • Affiliations:
  • Tsinghua University, China;University of Toronto, Canada;University of Toronto, Canada

  • Venue:
  • COMPSAC '06 Proceedings of the 30th Annual International Computer Software and Applications Conference - Volume 02
  • Year:
  • 2006

Quantified Score

Hi-index 0.01

Visualization

Abstract

Design for security is extremely complicated due to the unique nature of the issue. It requires a thorough understanding about the social setting of the security system. To obtain such understanding, sensible steps to take include identifying the players involved in the system, recognizing their personal preferences, agenda and power in relation to other players, identifying the assets being protected, the vulnerable points at which the systems may fail when attacked. Equally important is to taking rationale steps to predict most likely attackers, knowing their possible motivations, and capabilities enabled by latest the technologies and resource occupations. Only based on integrated analysis on both sides, rationale, informative and efficient tradeoffs on security can be made. Unfortunately, current system development practices treat design decisions on security in an adhoc way, often as an afterthought. This paper proposes to use social modeling concepts to analyze the business and organizational context of systems with regard to security. The main concepts used are actor, role, agent and goal, task, and resource dependencies between actors. The approach encompasses several analysis steps on the functional and non-functional requirements in relevance to security, thus integrating security into the system design process from the outset.