Security driven requirements refinement and exploration of architecture with multiple NFR points of view

Takao Okubo, Nobukazu Yoshioka, Haruhiko Kaiya

Research output: Contribution to conferencePaperpeer-review

2 Citations (Scopus)

Abstract

Earlier software architecture design is essential particularly when it comes to security concerns, since security risks, requirements and architectures are all closely interrelated and interacting. We have proposed the security driven twin peaks method with a mutual refinement of the requirements, and architectures. However, there are multiple alternatives to an architecture design for initial requirements, and their choices depend on non-functional requirements (NFRs), such as security, performance, and cost which often largely change. We propose a new method we call TPM-SA2 to avoid any back-track in refinement. Each architectural alternative in TPM-SA2 is refined so that it aligns with the requirements. For each refinement, the requirements can be updated vice versa. TPM-SA2 enables us to predict the impacts on the NFRs by each candidate for the architecture, and choose the most appropriate one with respect to the impact. As a result, we can define the requirements and architectures, and estimated the development costs earlier than ever.

Original languageEnglish
Pages201-205
Number of pages5
DOIs
Publication statusPublished - 2014
Externally publishedYes
Event2014 IEEE 15th International Symposium on High-Assurance Systems Engineering, HASE 2014 - Miami, FL, United States
Duration: 2014 Jan 92014 Jan 11

Conference

Conference2014 IEEE 15th International Symposium on High-Assurance Systems Engineering, HASE 2014
Country/TerritoryUnited States
CityMiami, FL
Period14/1/914/1/11

Keywords

  • Requirement analysis
  • Security
  • Threat analysis
  • Twin peaks

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'Security driven requirements refinement and exploration of architecture with multiple NFR points of view'. Together they form a unique fingerprint.

Cite this