Misuse Cases + Assets + Security Goals

@article{Okubo2009MisuseC,
  title={Misuse Cases + Assets + Security Goals},
  author={T. Okubo and K. Taguchi and N. Yoshioka},
  journal={2009 International Conference on Computational Science and Engineering},
  year={2009},
  volume={3},
  pages={424-429}
}
  • T. Okubo, K. Taguchi, N. Yoshioka
  • Published 2009
  • Computer Science
  • 2009 International Conference on Computational Science and Engineering
  • Security is now the most critical feature of any computing systems. Eliciting and analyzing security requirements in the early stages of the system development process is highly recommended to reduce security vulnerabilities which might be found in the later stages of the system development process. In order to address this issue, we will propose a new extension of the misuse case diagram for analyzing and eliciting security requirements with special focus on assets and security goals. We will… CONTINUE READING
    21 Citations
    MASG: Advanced Misuse Case Analysis Model with Assets and Security Goals
    • 5
    • PDF
    MASG: Advanced Misuse Case Analysis Model with Assets and Security Goals
    • 1
    TESEM: A Tool for Verifying Security Design Pattern Applications by Model Testing
    • 9
    • PDF
    Aligning Security Requirements and Security Assurance Using the Common Criteria
    • 12
    A Framework for Security Requirements Elicitation
    • 2
    • Highly Influenced
    • PDF
    Holistic Security Requirements Engineering for Socio-Technical Systems
    • T. Li
    • Engineering, Computer Science
    • 2016
    • 2
    • PDF

    References

    SHOWING 1-10 OF 12 REFERENCES
    Security quality requirements engineering (SQUARE) methodology
    • 235
    • PDF
    Using abuse case models for security requirements analysis
    • J. McDermott, C. Fox
    • Computer Science
    • Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99)
    • 1999
    • 473
    • PDF
    Web security patterns for analysis and design
    • 14
    • PDF
    Elaborating security requirements by construction of intentional anti-models
    • A. V. Lamsweerde
    • Computer Science
    • Proceedings. 26th International Conference on Software Engineering
    • 2004
    • 446
    • PDF
    Eliciting security requirements by misuse cases
    • G. Sindre, A. Opdahl
    • Computer Science
    • Proceedings 37th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Pacific 2000
    • 2000
    • 176
    • PDF
    Security Requirements Engineering: A Framework for Representation and Analysis
    • 414
    • PDF
    Eliciting security requirements with misuse cases
    • 925
    • PDF
    Security Use Cases
    • 235
    • PDF
    Security and privacy requirements analysis within a social setting
    • L. Liu, E. Yu, J. Mylopoulos
    • Computer Science
    • Proceedings. 11th IEEE International Requirements Engineering Conference, 2003.
    • 2003
    • 417
    • PDF
    Secure Software Development through Coding Conventions and Frameworks
    • T. Okubo, H. Tanaka
    • Computer Science
    • The Second International Conference on Availability, Reliability and Security (ARES'07)
    • 2007
    • 5
    • PDF