Authors: Eric Yu, Golnaz Elahi
Tags: 2009, conceptual modeling
In designing software systems, security is typically only one design objective among many. It may compete with other objectives such as functionality, usability, and performance. Too often, security mechanisms such as firewalls, access control, or encryption are adopted without explicit recognition of competing design objectives and their origins in stakeholders’ interests. Recently, there is increasing acknowledgement that security is ultimately about trade-offs. One can only aim for ‘‘good enough” security, given the competing demands from many parties. This paper investigates the criteria for a conceptual modeling technique for making security trade-offs. We examine how conceptual modeling can provide explicit and systematic support for modeling and analyzing security trade-offs. We examine several existing approaches for dealing with trade-offs and security trade-offs in particular. From analyzing the limitations of existing methods, we propose an extension to the i* Framework for security trade-off analysis, taking advantage of its multi-agent and goal orientation. The method was applied to several case studies used to exemplify existing approaches. The resulting models developed using different approaches are compared.
Read the full paper here: https://pdf.sciencedirectassets.com/271546/1-s2.0-S0169023X09X00066/1-s2.0-S0169023X09000226/main.pdf?X-Amz-Security-Token=IQoJb3JpZ2luX2VjEC8aCXVzLWVhc3QtMSJHMEUCIQCkbjnfTt9xQEx2I1T1pvN7pCMzrZvQiB4QAF%2F%2FdY91egIgRVZtAHqLEpJCZB%2B1FlIJK2nh7NSpjKs6mYBzG0iY%2B0AqtAMIOBADGgwwNTkwMDM1NDY4NjUiDLFFDMtFg9EVjhlc6SqRA2OJxvU%2ByMolv2zqu0Lsm0KZ9PUVxldKGFvn3iEbsXs3jODHESTAFYZm19vFbR60UciX8%2BtOYAY%2B5%2FWJz9VjdZFxjjVqH3kYWNt8LoRFWBwyHuJSLuDK4SxNwcN5is4Signqp%2Fw2iqhrQuSVSHbR1Rmdo2GeAGSi4FQ4F%2F%2B3pXFyOsyPua1mwLG7bKz9MbMDs9wgdP5C6kuG3STyd3b2l2Y8%2FRZ2pxnzddzR9CxheXZnOVDtqOjwi5ODOFruJ9ZzBgbBPfFGDkX%2FiCk1tzooUOY7%2F0XXtLAwCHTzlOBlzdHS7yWagb8ZumVvD7z%2FM9XPWVRGigAYM2LCsNasRWbV4xc4UV3VQkflhFo5ID%2BtXdI92k9TUJuFkqAU%2FcyfEZvxXGcFtV3rXjPw98PgNZ%2BXfeo9vacnNtcZIhVNKdhDTlcfUaLkWCRSBmRx4XsvPRBRW%2BUg1ZZbAs4vw0pvJCkbx5HhdXXPmuMwr%2BklLaT8n0Vbs2ROxebkhr0GWb8ilixUXfEBO%2FNRqXLijH0e0tGfwUDPMNGW4PoFOusBsgm1rFKx%2Fk61aMuWYs%2FGfpgY7MpUy%2FXP%2BY2wgMCe3xKAFzauOdZxx%2B%2BrAzWIBk2Y8%2BZCSre2zSsssjYK0yA8XhzakF%2F4HRhouxfD%2FIoVSmZ8C%2BsCiXzpeKeIYoxP%2FDBpOLDp4Z37SWFh3pGwiTIIsOEDfVggM6oa82lwiPRklASD6Eo9Kwv2c57PRhM3rBUMMz6vNE8AuMOqyeQQFr7aDD5ZGlh00umPTaFWqT7uvFYRmhC%2F31Ao27hIv9hyk7uyuAxDYp0YwFNWQzFUZYpBr%2BQgTwI95ltfXYevBcEtksA8pSUHJ1QNt6zOUA%3D%3D&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200908T235852Z&X-Amz-SignedHeaders=host&X-Amz-Expires=300&X-Amz-Credential=ASIAQ3PHCVTYRSNLR5MG%2F20200908%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=e87ab369fc9d1bd1795055ed61ca7c7577296baa379ad24f5990f483ee5063fd&hash=b49af3092c464558f60e45a6d7828750128b93310266cddda236eed4d06e1ef9&host=68042c943591013ac2b2430a89b270f6af2c76d8dfd086a07176afe7c76c2c61&pii=S0169023X09000226&tid=spdf-ed547515-4d61-42b1-8f7a-31b93f03cf7d&sid=006e6d4c3109c14eb9383ad2b0357d9edc3agxrqa&type=client