Misuse Cases + Assets + Security Goals
@article{Okubo2009MisuseC, title={Misuse Cases + Assets + Security Goals}, author={T. Okubo and K. Taguchi and N. Yoshioka}, journal={2009 International Conference on Computational Science and Engineering}, year={2009}, volume={3}, pages={424-429} }
Security is now the most critical feature of any computing systems. Eliciting and analyzing security requirements in the early stages of the system development process is highly recommended to reduce security vulnerabilities which might be found in the later stages of the system development process. In order to address this issue, we will propose a new extension of the misuse case diagram for analyzing and eliciting security requirements with special focus on assets and security goals. We will… CONTINUE READING
21 Citations
MASG: Advanced Misuse Case Analysis Model with Assets and Security Goals
- Computer Science
- J. Inf. Process.
- 2014
- 5
- PDF
GRACE TECHNICAL REPORTS Security Requirements Analysis and Validation with Misuse Cases and Institutional Modelling
- Political Science
- 2012
Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment
- Computer Science
- Int. J. Secur. Softw. Eng.
- 2013
- 5
- PDF
TESEM: A Tool for Verifying Security Design Pattern Applications by Model Testing
- Computer Science
- 2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST)
- 2015
- 9
- PDF
Aligning Security Requirements and Security Assurance Using the Common Criteria
- Engineering, Computer Science
- 2010 Fourth International Conference on Secure Software Integration and Reliability Improvement
- 2010
- 12
Identification, Implementation and Validation of Authentication and Authorization pattern in Distributed System using Spring Security Framework
- Computer Science
- 2016
- PDF
Validating Security Design Pattern Applications by Testing Design Models
- Computer Science
- Int. J. Secur. Softw. Eng.
- 2014
- 7
- PDF
Holistic Security Requirements Engineering for Socio-Technical Systems
- Engineering, Computer Science
- 2016
- 2
- PDF
References
SHOWING 1-10 OF 12 REFERENCES
Security quality requirements engineering (SQUARE) methodology
- Engineering, Computer Science
- SOEN
- 2005
- 231
- PDF
Using abuse case models for security requirements analysis
- Computer Science
- Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99)
- 1999
- 484
- PDF
Eliciting security requirements by misuse cases
- Computer Science
- Proceedings 37th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Pacific 2000
- 2000
- 165
- PDF
Elaborating security requirements by construction of intentional anti-models
- Engineering, Computer Science
- Proceedings. 26th International Conference on Software Engineering
- 2004
- 452
- PDF
Security Requirements Engineering: A Framework for Representation and Analysis
- Computer Science
- IEEE Transactions on Software Engineering
- 2008
- 420
- PDF
Security and privacy requirements analysis within a social setting
- Computer Science
- Proceedings. 11th IEEE International Requirements Engineering Conference, 2003.
- 2003
- 419
- PDF
Secure Software Development through Coding Conventions and Frameworks
- Computer Science
- The Second International Conference on Availability, Reliability and Security (ARES'07)
- 2007
- 5
- PDF