The Open UniversitySkip to content

The Security Twin Peaks

Heyman, Thomas; Yskout, Koen; Scandariato, Riccardo; Schmidt, Holger and Yu, Yijun (2011). The Security Twin Peaks. In: Engineering Secure Software and Systems - Third International Symposium, 09-10 Feb 2011, Madrid, Spain.


This is the latest version of this eprint.

Full text available as:
PDF (Accepted Manuscript) - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
Download (571Kb)
DOI (Digital Object Identifier) Link:
Google Scholar: Look up in Google Scholar


The feedback from architectural decisions to the elaboration of requirements is an established concept in the software engineering community. However, pinpointing the nature of this feedback in a precise way is a largely open problem. Often, the feedback is generically characterized as additional qualities that might be affected by an architect’s choice. This paper provides a practical perspective on this problem by leveraging architectural security patterns. The contribution of this paper is the Security Twin Peaks model, which serves as an operational framework to co-develop security in the requirements and the architectural artifacts.

Item Type: Conference Item
Copyright Holders: 2011 Springer-Verlag Berlin Heidelberg
Project Funding Details:
Funded Project NameProject IDFunding Body
Not SetNot SetEU FP7 SecureChange
Extra Information: Engineering Secure Software and Systems
Third International Symposium, ESSoS 2011
Madrid, Spain, February 9-10, 2011
Proceedings published in Lecture Notes in Computer Science.
Úlfar Erlingsson Roel Wieringa Nicola Zannone (Eds.)
ISSN 0302-9743
e-ISSN 1611-3349
ISBN 978-3-642-19124-4
e-ISBN 978-3-642-19125-1
The original publication is available at
Keywords: security; software architecture; requirements; patterns
Academic Unit/Department: Mathematics, Computing and Technology > Computing & Communications
Interdisciplinary Research Centre: Centre for Research in Computing (CRC)
Item ID: 28408
Depositing User: Yijun Yu
Date Deposited: 21 Mar 2011 09:31
Last Modified: 25 Oct 2012 13:39
Share this page:

Available Versions of this Item


Scopus Citations

Actions (login may be required)

View Item
Report issue / request change

Policies | Disclaimer

© The Open University   + 44 (0)870 333 4340