Visible to the public Proactive Model-Based Performance Analysis and Security Tradeoffs in a Complex System

TitleProactive Model-Based Performance Analysis and Security Tradeoffs in a Complex System
Publication TypeConference Paper
Year of Publication2014
AuthorsMusgrove, J., Cukic, B., Cortellessa, V.
Conference NameHigh-Assurance Systems Engineering (HASE), 2014 IEEE 15th International Symposium on
Date PublishedJan
KeywordsAirports, Analytical models, Atmospheric modeling, BIMS, Biological system modeling, border inspection management system, Border security, complex system, complicated control coordination, early performance evaluation, externally observable security parameters, Identity management, Inspection, Magnetic resonance, measurable security effect maximization, model-based approach, Performance - security tradeoff, Performance modeling, performance sensitivity analysis, proactive model-based performance analysis, resource allocation, security, security of data, security tradeoff mechanisms, sensitivity analysis, traveler arrival rate, traveler identification security guarantees

Application domains in which early performance evaluation is needed are becoming more complex. In addition to traditional measures of complexity due, for example, to the number of components, their interactions, complicated control coordination and schemes, emerging applications may require adaptive response and reconfiguration the impact of externally observable (security) parameters. In this paper we introduce an approach for effective modeling and analysis of performance and security tradeoffs. The approach identifies a suitable allocation of resources that meet performance requirements, while maximizing measurable security effects. We demonstrate this approach through the analysis of performance sensitivity of a Border Inspection Management System (BIMS) with changing security mechanisms (e.g. biometric system parameters for passenger identification). The final result is a model-based approach that allows us to take decisions about BIMS performance and security mechanisms on the basis of rates of traveler arrivals and traveler identification security guarantees. We describe the experience gained when applying this approach to daily flight arrival schedule of a real airport.

Citation Key6754608