Heyman, TomTomHeymanYskout, KoenKoenYskoutScandariato, RiccardoRiccardoScandariatoSchmidt, HolgerHolgerSchmidtYu, YijunYijunYu2023-03-102023-03-102011-02Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 6542 LNCS: 167-180 (2011-02-07)http://hdl.handle.net/11420/14977The feedback from architectural decisions to the elaboration of requirements is an established concept in the software engineering community. However, pinpointing the nature of this feedback in a precise way is a largely open problem. Often, the feedback is generically characterized as additional qualities that might be affected by an architect's choice. This paper provides a practical perspective on this problem by leveraging architectural security patterns. The contribution of this paper is the Security Twin Peaks model, which serves as an operational framework to co-develop security in the requirements and the architectural artifacts.enpatternsrequirementssecuritysoftware architectureInformatikThe security twin peaksConference Paper10.1007/978-3-642-19125-1_13Other