Skip to Main Content
Developing secure systems at software architecture stage presents additional challenges: a system may demand multiple security capabilities and each security capability can be realized by many security solutions. Effective techniques are needed to assist software architects in modeling and evaluating security capabilities. The benefits of such techniques include enabling software architects to create an optimized security architecture design. This paper presents a modeling approach to support security variability design and analysis. In the approach, security capabilities are modeled as aspects and alternative security solutions are reflected. This allows to effectively perform interaction analysis among security solutions, e.g., determining supporting or conflicting solutions etc. A Health Watcher system is used to illustrate the approach, where the system is designed with two security aspects, data origin authentication and non-repudiation. The proposed security variability design approach has been showed to effectively support the interaction analysis between data origin authentication solutions and non-repudiation solutions.