Abstract
Cybersecurity is a fundamental aspect of socio-technical systems. Unfortunately, the price to pay for a secure system is an overhead of computational power and, therefore, of energy consumption. With the last global events, energy consumption is not anymore a secondary effect but should become a relevant driver of decisions on the security measures to implement. Thus, the design of security policies for socio-technical systems should consider energy consumption to carefully choose security measures to deploy. Security policies identify the security objectives of actors in socio-technical systems, the security measures that enforce them, and the business processes affected by these measures. In this direction, the goal of this paper is to propose a method for the energy-aware design of security policies. An estimation of the energy consumption of security goals will be calculated to allow the definition of security policies considering their energy consumption.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., Mylopoulos, J.: Tropos: an agent-oriented software development methodology. Auton. Agent. Multi-Agent Syst. 8(3), 203–236 (2004)
Caviglione, L., Merlo, A., Migliardi, M.: What is green security? In: International Conference on Information Assurance and Security (IAS), pp. 366–371. IEEE (2011)
Cotnoir, A., Varzi, A.C.: Mereology. Oxford University Press, Oxford (2021)
Elahi, G., Yu, E.: A goal oriented approach for modeling and analyzing security trade-offs. In: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.) ER 2007. LNCS, vol. 4801, pp. 375–390. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-75563-0_26
Gonçalves, E., Castro, J., Araújo, J., Heineck, T.: A systematic literature review of istar extensions. J. Syst. Softw. 137, 1–33 (2018)
Horkoff, J., et al.: Goal-oriented requirements engineering: an extended systematic mapping study. Requirements Eng. 24, 133–160 (2019)
Horkoff, J., et al.: Making data meaningful: the business intelligence model and its formal semantics in description logics. In: Meersman, R., et al. (eds.) OTM 2012. LNCS, vol. 7566, pp. 700–717. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-33615-7_17
Kurp, P.: Green computing. Commun. ACM 51(10), 11–13 (2008)
Merlo, A., Migliardi, M., Caviglione, L.: A survey on energy-aware security mechanisms. Pervasive Mob. Comput. 24, 77–90 (2015)
Mouratidis, H., Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. 17(02), 285–309 (2007)
OMG: BPMN 2.0. Technical Report, January 2011. http://www.omg.org/spec/BPMN/2.0
Paja, E., Dalpiaz, F., Giorgini, P.: Modelling and reasoning about security requirements in socio-technical systems. Data Knowl. Eng. 98, 123–143 (2015)
Rodríguez, A., Fernández-Medina, E., Piattini, M.: A BPMN extension for the modeling of security requirements in business processes. IEICE Trans. Inf. Syst. 90(4), 745–752 (2007)
Salnitri, M., Paja, E., Giorgini, P.: Maintaining secure business processes in light of socio-technical systems’ evolution. In: 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW), pp. 155–164. IEEE (2016)
Yu, E.: Modeling strategic relationships for process reengineering. Soc. Model. Requirements Eng. 11(2011), 66–87 (2011)
Acknowledgment
This project has received funding from the European Union’s Horizon Europe under grant agreement no. 101070186 (TEADAL) and by the European Social Fund REACT EU-National Research and Innovation Operational Program 2014–2020, Ministry of University and Research.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Salnitri, M., Plebani, P., Raffone, A. (2023). Towards Designing Energy-Aware Cybersecurity Policies. In: Cabanillas, C., Pérez, F. (eds) Intelligent Information Systems. CAiSE 2023. Lecture Notes in Business Information Processing, vol 477. Springer, Cham. https://doi.org/10.1007/978-3-031-34674-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-031-34674-3_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-34673-6
Online ISBN: 978-3-031-34674-3
eBook Packages: Computer ScienceComputer Science (R0)