Agree to disagree: Security requirements are different, but mechanisms for security adaptation are not

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We describe a dialogue between a proponent and an opponent of the proposition "security is not just another quality attribute in self-adaptive systems". The dialogue is structured in two steps. First, we examine whether security requirements are different from other system-level requirements. Our consensus is that security requirements require specific methods for elicitation, reasoning, and analysis. However, other requirements (such as safety, usability and performance) also require specific techniques. Then, we examine the adaptation mechanisms for security and compare them with other properties. Our consensus is that most adaptation techniques can be applied to maintain security and other requirements alike.

Original languageEnglish
Title of host publicationProceedings - 2018 ACM/IEEE 13th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2018
PublisherIEEE Computer Society
Pages194-195
Number of pages2
ISBN (Print)9781450357159
DOIs
Publication statusPublished - 28 May 2018
Externally publishedYes
EventACM/IEEE 13th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2018, , co-located with International Conference on Software Engineering, ICSE 2018 - Gothenburg, Sweden
Duration: 28 May 201829 May 2018

Publication series

NameProceedings - International Conference on Software Engineering
ISSN (Print)0270-5257

Conference

ConferenceACM/IEEE 13th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2018, , co-located with International Conference on Software Engineering, ICSE 2018
Country/TerritorySweden
CityGothenburg
Period28/05/1829/05/18

Keywords

  • security requirements
  • self-adaptation

Fingerprint

Dive into the research topics of 'Agree to disagree: Security requirements are different, but mechanisms for security adaptation are not'. Together they form a unique fingerprint.

Cite this