Eliciting security requirements with misuse cases
@article{Sindre2004ElicitingSR, title={Eliciting security requirements with misuse cases}, author={G. Sindre and A. Opdahl}, journal={Requirements Engineering}, year={2004}, volume={10}, pages={34-44} }
Use cases have become increasingly common during requirements engineering, but they offer limited support for eliciting security threats and requirements. At the same time, the importance of security is growing with the rise of phenomena such as e-commerce and nomadic and geographically distributed work. This paper presents a systematic approach to eliciting security requirements based on use cases, with emphasis on description and method guidelines. The approach extends traditional use cases… CONTINUE READING
Figures, Tables, and Topics from this paper
934 Citations
Using Common Criteria as Reusable Knowledge in Security Requirements Elicitation
- Computer Science
- MODSEC@MoDELS
- 2008
- 6
- PDF
Eliciting usable security requirements with misusability cases
- Computer Science
- 2011 IEEE 19th International Requirements Engineering Conference
- 2011
- 5
- PDF
Using the Common Criteria to Elicit Security Requirements with Use Cases
- Computer Science
- Proceedings of the IEEE SoutheastCon 2006
- 2006
- 37
- Highly Influenced
- PDF
Security Requirements Elicitation via Weaving Scenarios Based on Security Evaluation Criteria
- Computer Science
- Seventh International Conference on Quality Software (QSIC 2007)
- 2007
- 2
References
SHOWING 1-10 OF 60 REFERENCES
Eliciting security requirements by misuse cases
- Computer Science
- Proceedings 37th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Pacific 2000
- 2000
- 165
- PDF
Using abuse case models for security requirements analysis
- Computer Science
- Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99)
- 1999
- 484
- Highly Influential
- PDF
Abuse-case-based assurance arguments
- Computer Science
- Seventeenth Annual Computer Security Applications Conference
- 2001
- 75
- Highly Influential
Security requirements engineering: when anti-requirements hit the fan
- Engineering, Computer Science
- Proceedings IEEE Joint International Conference on Requirements Engineering
- 2002
- 118
- PDF
Deriving Goals from a Use-Case Based Requirements Specification
- Business, Engineering
- Requirements Engineering
- 2001
- 121
- PDF