Eliciting security requirements by misuse cases
@article{Sindre2000ElicitingSR, title={Eliciting security requirements by misuse cases}, author={G. Sindre and A. Opdahl}, journal={Proceedings 37th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Pacific 2000}, year={2000}, pages={120-131} }
Use case diagrams (L. Jacobson et al., 1992) have proven quite helpful in requirements engineering, both for eliciting requirements and getting a better overview of requirements already stated. However, not all kinds of requirements are equally well supported by use case diagrams. They are good for functional requirements, but poorer at e.g., security requirements, which often concentrate on what should not happen in the system. With the advent of e- and m-commerce applications, security… CONTINUE READING
168 Citations
Integrating functional and security requirements with use case decomposition
- Computer Science
- 11th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'06)
- 2006
- 10
Misuse Cases + Assets + Security Goals
- Computer Science
- 2009 International Conference on Computational Science and Engineering
- 2009
- 21
- PDF
Security Requirements Elicitation Using View Points for Online System
- Computer Science
- 2008 First International Conference on Emerging Trends in Engineering and Technology
- 2008
- 20
References
SHOWING 1-5 OF 5 REFERENCES
Use cases, UML visual modelling and the trivialisation of business requirements
- Computer Science
- Requirements Engineering
- 2008
- 7
Guiding Goal Models Using Scenarios ”
- IEEE Transactions on Software Engineering
- 1996
Getting Started: Using Use Cases to Capture Requirements
- Computer Science
- J. Object Oriented Program.
- 1994
- 164
Deriving Goals h m a Use Case Based Requirements Specification for an Electronic Commerce System ”
- Scenario Usage in System Development : A Report on Current Practice “ , IEEE Software