Loading...
Please wait, while we are loading the content...
Similar Documents
Towards security risk-oriented misuse cases.
| Content Provider | CiteSeerX |
|---|---|
| Author | Soomro, Inam Ahmed, Naved |
| Abstract | Abstract. Security has turn out to be a necessity of information systems (ISs) and information per se. Nevertheless, existing practices report on numerous cases when security aspects were considered only at the end of the development process, thus, missing the systematic security analysis. Misuse case diagrams help identify security concerns at early stages of the IS development. Despite this fundamental advantage, misuse cases tend to be rather imprecise; they do not comply with security risk management strategies, and, thus, could lead to misinterpretation of the security-related concepts. Such limitations could poten-tially result in poor security solutions. This paper applies a systematic approach to understand how misuse case diagrams could help model organisational as-sets, potential risks, and security countermeasures to mitigate these risks. The contribution helps understand how misuse cases could deal with security risk management and support reasoning for security requirements and their imple-mentation in the software system. |
| File Format | |
| Access Restriction | Open |
| Subject Keyword | Towards Security Risk-oriented Misuse Case Misuse Case Security Requirement Systematic Security Analysis Security Risk Management Strategy Practice Report Fundamental Advantage Security Countermeasure Early Stage Security Concern Information System Potential Risk Development Process Organisational As-sets Misuse Case Diagram Security Aspect Security-related Concept Security Risk Management Systematic Approach Numerous Case Poor Security Solution Software System |
| Content Type | Text |
| Resource Type | Article |