Security Satisfaction Arguments in Compendium
Satisfaction arguments need to be constructed when analyzing the security needs of a system. One begins by representing the system using Jackson’s problem frames [18], adds security requirements in the form of constraints [22], and then attempts to argue that the system satisfies the security requirements. These arguments are the satisfaction arguments.In most cases, an …