TY - GEN
T1 - Mutual refinement of security requirements and architecture using twin peaks model
AU - Okubo, Takao
AU - Kaiya, Haruhiko
AU - Yoshioka, Nobukazu
PY - 2012
Y1 - 2012
N2 - It is difficult to sufficiently specify software security requirements because they depend on a software architecture that has not yet been designed. Although the Twin Peaks model is a reference model to elicit a sufficient amount of software requirements in conjunction with the architectural requirements, it is still unclear how the security requirements can be elicited while taking the architecture into consideration. We propose a novel method to elicit the security requirements with architecture elaboration based on the Twin Peaks model, which is called the Twin Peaks Model application for Security Analysis (TMP-SA). In our method, security countermeasures for attacks are elicited as the security requirements incrementally according to the refinement of the architecture. We can comprehensively explore the alternatives for the countermeasures (security requirements) and choose the most suitable one for each project because we can focus on the architecture-specific security issues as well as architecture-independent security issues. We have applied our method to several applications and discuss its advantages and limitations. We found that our method is suitable for iterative development, and it enables us to find threats caused by architectural issues that are severely difficult to find when analyzing only the requirements issues.
AB - It is difficult to sufficiently specify software security requirements because they depend on a software architecture that has not yet been designed. Although the Twin Peaks model is a reference model to elicit a sufficient amount of software requirements in conjunction with the architectural requirements, it is still unclear how the security requirements can be elicited while taking the architecture into consideration. We propose a novel method to elicit the security requirements with architecture elaboration based on the Twin Peaks model, which is called the Twin Peaks Model application for Security Analysis (TMP-SA). In our method, security countermeasures for attacks are elicited as the security requirements incrementally according to the refinement of the architecture. We can comprehensively explore the alternatives for the countermeasures (security requirements) and choose the most suitable one for each project because we can focus on the architecture-specific security issues as well as architecture-independent security issues. We have applied our method to several applications and discuss its advantages and limitations. We found that our method is suitable for iterative development, and it enables us to find threats caused by architectural issues that are severely difficult to find when analyzing only the requirements issues.
KW - Application security
KW - Software requirements engineering
KW - Twin peaks model
UR - http://www.scopus.com/inward/record.url?scp=84870777295&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84870777295&partnerID=8YFLogxK
U2 - 10.1109/COMPSACW.2012.72
DO - 10.1109/COMPSACW.2012.72
M3 - Conference contribution
AN - SCOPUS:84870777295
SN - 9780769547589
T3 - Proceedings - International Computer Software and Applications Conference
SP - 367
EP - 372
BT - Proceedings - 36th Annual IEEE International Computer Software and Applications Conference Workshops, COMPSACW 2012
T2 - 36th Annual IEEE International Computer Software and Applications Conference Workshops, COMPSACW 2012
Y2 - 16 July 2012 through 20 July 2012
ER -