The Community for Technology Leaders
Green Image
Issue No. 03 - May/June (2010 vol. 36)
ISSN: 0098-5589
pp: 338-356
Geri Georg , Colorado State University, Fort Collins, CO
Kyriakos Anastasakis , University of Birmingham, Birmingham, UK
Behzad Bordbar , University of Birmingham, Birmingham, UK
Siv Hilde Houmb , Telenor GBDR, Trondheim, Norway
Indrakshi Ray , Colorado State University, Fort Collins, CO
Manachai Toahchoodee , Colorado State University, Fort Collins, CO
Designing secure systems is a nontrivial task. Incomplete or faulty designs can cause security mechanisms to be incorrectly incorporated in a system, allowing them to be bypassed and resulting in a security breach. We advocate the use of the Aspect-Oriented Risk-Driven Development (AORDD) methodology for developing secure systems. This methodology begins with designers defining system assets, identifying potential attacks against them, and evaluating system risks. When a risk is unacceptable, designers must mitigate the associated threat by incorporating security mechanisms methodically into the system design. Designers next formally evaluate the resulting design to ensure that the threat has been mitigated, while still allowing development to meet other project constraints. In this paper, we focus on the AORDD analysis, which consists of: 1) a formal security evaluation and 2) a trade-off analysis that enables system designers to position alternative security solutions against each other. The formal security evaluation uses the Alloy Analyzer to provide assurance that an incorporated security mechanism performs as expected and makes the system resilient to previously identified attacks. The trade-off analysis uses a Bayesian Belief Network topology to allow equally effective security mechanisms to be compared against system security requirements and other factors such as time-to-market and budget constraints.
Aspect-oriented modeling (AOM), Bayesian belief network (BBN), security analysis, trade-off analysis.

S. H. Houmb, G. Georg, M. Toahchoodee, B. Bordbar, I. Ray and K. Anastasakis, "Verification and Trade-Off Analysis of Security Properties in UML System Models," in IEEE Transactions on Software Engineering, vol. 36, no. , pp. 338-356, 2010.
96 ms
(Ver 3.3 (11022016))