these findings, it is our opinion that having 2 servers in the PIS would be the optimal
solution based on this tradeoff analysis. This would virtually eliminate any down
time, while still keeping successful attacks under 1 per hour.
Table 4. Sensitivity to the number of servers in the PIS
1 Server 2 Servers 3 Servers
Combined downtime
Hardware: (F=2/yr, R=730/yr)
Software:(F=24/yr, R=52560/yr)
27.922 hours/year .1344 hours/year .0010 hours/year
Successful Attacks F = 10/year .486 attacks/hour .972 attacks/hour 1.944 attacks/hour
5 Conclusion
This case study shows an added step to our previous research [12] by completing a
tradeoff analysis on the architecture derived from a use case model. This tradeoff
analysis, which followed the ATAM, helped solidify our overall approach [3]. It is
important to realize that the architecture was constructed from the system information
presented in the use case models and sequence diagrams. This bridges a gap between
requirements specification and architecture design.
References
1. Alexander, I. Initial industrial experience of misuse cases. In Proc. of IEEE Joint Interna-
tional Requirements Engineering Conference, (2002) pp. 61-68
2. Alexander, I. Misuse cases: Use cases with hostile intent. IEEE Software, (2003) pp. 58-66
3. Barbacci, M., Carriere, J., Kazman, R., Klein, M., Lipson, H., Longstaff, T., and Weinstock,
C. Steps Toward an architecture trade-off analysis method: Quality attribute models and
analysis. CMU/SEI-97-TR-29, (1997)
4. Firesmith, D. Security use cases. Journal of Object Technology, (2003)Vol. 2, No. 3, 53-64.
5. Hoglund, G. and McGraw, G. Exploiting software: How to break code. Addison-Wesley.
(2004)
6. Howard, M. and LeBlanc, D. Writing secure code. Microsoft Press. 2nd edition, (2003)
7. Jacobson, I., Christerson, M., Jonsson, P., and Overgaard, G. Object-Oriented SoftwareEn-
gineering: A Use Case Driven Approach. Addison-Wesley, (1994)
8. Kantorowitz, E., Lyakas, A., and Myasqobsky, A. Use case-oriented software architecture.
CMC03 (2003)
9. Kazman, R., Abowd, G., Bass, L., and Clements, P. Scenario-based analysis of software
architecture. IEEE Software. pp.47-55, (1996)
10. Kazman, R., Klein, M., Barbacci, M., Longstaff, T., Lipson, H., and Carriere, J. The archi-
tecture tradeoff analysis method. In Proc. of the 4
th
International Conference on Engineering
of Complex Computer Systems (ICECCS98), (1998)
11. McDermott, J. and Fox, C. Using abuse case models for security requirements analysis. In
Proc. of the 15th Annual Computer Security Application Conference, pp. 55-66, (1999)
12. Pauli, J., and Xu, D., Threat-driven architectural design of secure information systems.
In Proc. of ICEIS’05. Miami, May 2005. To appear.
94