Towards a New Quantitative Availability Model for Computer Systems Based on Classifications of Security Requirements

Towards a New Quantitative Availability Model for Computer Systems Based on Classifications of Security Requirements

Chaima Boulifi, Mouna Jouini
DOI: 10.4018/IJSSSP.314626
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cloud computing is an emerging computing paradigm that replaces computing as a personal asset with computing as a public service. As such, it offers all the advantages of a public utility system, in terms of economy of scale, flexibility, and convenience, but it poses major problems including the loss of availability. In this article, the authors define and refine a taxonomy of basic security requirements suitable for all contexts and systems; then the resulted hierarchical model is used to create a new approach to quantifying the availability of it systems. This new measure is inspired from the mean failure cost (MFC). Measure and called availability mean failure cost (MFCa) is the average monetary value of loss per unit of time of use of each participant. This metric gives us a more accurate estimate, clear refinement, and useful interpretation for availability-related decision making using MFCa. How this metric can be used to analyze cloud computing as a business model is something to be explored.
Article Preview
Top

2. Security Requirements Classifications

Security (Caldern and Marta, 2007) is currently a major concern for software engineers. Much attention has been paid to security vulnerabilities introduced during the design or coding phases of the software development lifecycle. However, there is a need to use more security guides in the requirements engineering phase. Although security vulnerabilities are rarely introduced in requirements specifications, it is highly recommended to consider security requirements early in the software development process, to avoid introducing vulnerabilities during this development phase. Security requirements can be expressed as security constraints on functional requirements.

However, most of the time security requirements are defined by describing the mechanism used to implement the security (e.g. the system must provide an authentication mechanism), but the security issue that the requirement is supposed to resolve is unclear and the security requirements are not linked to the functional requirements.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 14: 1 Issue (2023)
Volume 13: 2 Issues (2022): 1 Released, 1 Forthcoming
Volume 12: 2 Issues (2021)
Volume 11: 2 Issues (2020)
Volume 10: 2 Issues (2019)
Volume 9: 4 Issues (2018)
View Complete Journal Contents Listing