Seventeenth Annual Computer Security Applications Conference
DOI: 10.1109/acsac.2001.991553
|View full text |Cite
|
Sign up to set email alerts
|

Abuse-case-based assurance arguments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
40
0

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(42 citation statements)
references
References 6 publications
0
40
0
Order By: Relevance
“…In [13,14] McDermott and Fox have proposed abuse cases to explore how threats and countermeasures could be modelled using standard UML use case but keeping abuse cases in a separate model. Abuse case focusses on security requirements whereas our approach is aligned with ISSRM and focusses on the overall security risk management.…”
Section: Misuse Casesmentioning
confidence: 99%
“…In [13,14] McDermott and Fox have proposed abuse cases to explore how threats and countermeasures could be modelled using standard UML use case but keeping abuse cases in a separate model. Abuse case focusses on security requirements whereas our approach is aligned with ISSRM and focusses on the overall security risk management.…”
Section: Misuse Casesmentioning
confidence: 99%
“…Several notations have been proposed for threat modeling, such as threat trees (a variation of fault trees for safety analysis) [15], threat nets [9,12], and misuse cases (based on use case modeling) [8,10]. Threat nets are based on Petri nets, a mathematically based formalism for modeling and verifying distributed systems.…”
Section: Background and Related Workmentioning
confidence: 99%
“…To date, researchers have developed various security testing techniques. These include techniques that generate test cases or identify vulnerabilities focusing on specific attacks, such as SQL injection or cross-site scripting (XSS) [4][5][6][7]; generate test cases using model-based approaches, such as threat modeling or use case modeling [8][9][10][11][12]; and generate test cases from control policy specifications [13,14] (Section 2 provides details).…”
Section: Introductionmentioning
confidence: 99%
“…Several notations have been proposed for threat modeling, such as threat trees (a variation of fault trees for safety analysis) [19], threat nets (based on Petri nets) [15,24], misuse cases (based on use case modeling) [4,18]. Obviously, threat models can be used to generate security tests for exercising whether the implementation is resistant from the identified security threats.…”
Section: Background and Related Workmentioning
confidence: 99%