The Open UniversitySkip to content

The Security Twin Peaks

Heyman, Thomas; Yskout, Koen; Scandariato, Riccardo; Schmidt, Holger and Yu, Yijun (2011). The Security Twin Peaks. In: Engineering Secure Software and Systems - Third International Symposium, 09-10 Feb 2011, Madrid, Spain.


This is the latest version of this eprint.

Full text available as:
PDF (Accepted Manuscript) - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
Download (584kB)
DOI (Digital Object Identifier) Link:
Google Scholar: Look up in Google Scholar


The feedback from architectural decisions to the elaboration of requirements is an established concept in the software engineering community. However, pinpointing the nature of this feedback in a precise way is a largely open problem. Often, the feedback is generically characterized as additional qualities that might be affected by an architect’s choice. This paper provides a practical perspective on this problem by leveraging architectural security patterns. The contribution of this paper is the Security Twin Peaks model, which serves as an operational framework to co-develop security in the requirements and the architectural artifacts.

Item Type: Conference or Workshop Item
Copyright Holders: 2011 Springer-Verlag Berlin Heidelberg
Project Funding Details:
Funded Project NameProject IDFunding Body
Not SetNot SetEU FP7 SecureChange
Extra Information: Engineering Secure Software and Systems
Third International Symposium, ESSoS 2011
Madrid, Spain, February 9-10, 2011
Proceedings published in Lecture Notes in Computer Science.
Úlfar Erlingsson Roel Wieringa Nicola Zannone (Eds.)
ISSN 0302-9743
e-ISSN 1611-3349
ISBN 978-3-642-19124-4
e-ISBN 978-3-642-19125-1
The original publication is available at
Keywords: security; software architecture; requirements; patterns
Academic Unit/School: Faculty of Science, Technology, Engineering and Mathematics (STEM) > Computing and Communications
Faculty of Science, Technology, Engineering and Mathematics (STEM)
Research Group: Centre for Research in Computing (CRC)
Item ID: 28408
Depositing User: Yijun Yu
Date Deposited: 21 Mar 2011 09:31
Last Modified: 07 Dec 2018 23:11
Share this page:

Available Versions of this Item


Altmetrics from Altmetric

Citations from Dimensions

Download history for this item

These details should be considered as only a guide to the number of downloads performed manually. Algorithmic methods have been applied in an attempt to remove automated downloads from the displayed statistics but no guarantee can be made as to the accuracy of the figures.

Actions (login may be required)

Policies | Disclaimer

© The Open University   contact the OU