Skip to main navigation Skip to search Skip to main content

Threat-driven architectural design of secure information systems

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

To deal with software security issues in the early stages of system development, this paper presents a threat-driven approach to the architectural design and analysis of secure information systems. In this approach, we model security threats to systems with misuse cases and mitigation requirements with mitigation use cases at the requirements analysis phase. Then we drive system architecture design (including the identification of architectural components and their connections) by use cases, misuse cases, and mitigation use cases. According to the misuse case-based threat model, we analyze whether or not a candidate architecture is resistant to the identified security threats and what constraints must be imposed on the choices of system implementation. This provides a smooth transition from requirements specification to high-level design and greatly improves the traceability of security concerns in high assurance information systems. We demonstrate our approach through a case study on a security-intensive payroll information system.

Original languageEnglish (US)
Title of host publicationICEIS 2005 - Proceedings of the 7th International Conference on Enterprise Information Systems
Pages136-143
Number of pages8
StatePublished - 2005
Externally publishedYes
Event7th International Conference on Enterprise Information Systems, ICEIS 2005 - Miami, FL, United States
Duration: May 25 2005May 28 2005

Publication series

NameICEIS 2005 - Proceedings of the 7th International Conference on Enterprise Information Systems

Conference

Conference7th International Conference on Enterprise Information Systems, ICEIS 2005
Country/TerritoryUnited States
CityMiami, FL
Period5/25/055/28/05

Keywords

  • Misuse case
  • Security
  • Software architecture
  • Threat model
  • UML
  • Use case

ASJC Scopus subject areas

  • Management Information Systems
  • Information Systems

Fingerprint

Dive into the research topics of 'Threat-driven architectural design of secure information systems'. Together they form a unique fingerprint.

Cite this