Abstract
Purpose - The selection of security configurations for complex information systems is a cumbersome process. Decision-making regarding the choice of security countermeasures has to take into consideration a multitude of, often conflicting, functional and non-functional system goals.Therefore, a structured method to support crucial security decisions during a system's design that can take account of risk whilst providing feedback on the optimal decisions within specific scenarios would be valuable.
Approach - Secure Tropos is a well established security requirements engineering methodology, but it has no concepts of Risk, whilst Constrained Goal Models are an existing method to support relevant automated reasoning tasks. Hence we bridge these methods, by (i) extending Secure Tropos to incorporate the concept of Risk, so that the elicitation and analysis of security requirements can be complimented by asystematic risk assessment process during a system's design time; (ii) supporting the reasoning regarding the selection of optimal security configurations with respect to multiple system objectives and constraints,via Constrained Goal Models.
Findings - As a means of conceptual evaluation, to give an idea ofthe applicability of the approach and to check if alterations may bedesirable, a case study of its application to an e-government informationsystem is presented. The proposed approach is able to generate security mechanism configurations for multiple optimisation scenarios that are provided, whilst there are limitations in terms of a natural trade-off of information levels of risk assessment that are required to be elicited.
Originality - The proposed approach adds additional value via its flexibility in permitting the consideration of different optimisation scenarios by prioritising different system goals and the automated reasoning support.
Original language | English |
---|---|
Pages (from-to) | 472-490 |
Journal | Information and Computer Security |
Volume | 26 |
Issue number | 4 |
DOIs | |
Publication status | Published - 8 Oct 2018 |
Keywords
- Information Security
- Security Requirements
- Decision Making
- Constraint Goal Models
- Secure Tropos