2006
DOI: 10.1109/msp.2006.149
|View full text |Cite
|
Sign up to set email alerts
|

Defining Misuse within the Development Process

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 1 publication
0
6
0
Order By: Relevance
“…Sindre and Opdahl give "get privileges" as a misuse case for "register customer" use case [16]. Peterson and Steven give "inject commands" as a misuse case for "review account" in a banking system [12]. Rostad gives "overflow attack" as a misuse for "enter user name" use case, which is mitigated by "input validation" [14].…”
Section: Orphan Misuses Anti-patternmentioning
confidence: 99%
“…Sindre and Opdahl give "get privileges" as a misuse case for "register customer" use case [16]. Peterson and Steven give "inject commands" as a misuse case for "review account" in a banking system [12]. Rostad gives "overflow attack" as a misuse for "enter user name" use case, which is mitigated by "input validation" [14].…”
Section: Orphan Misuses Anti-patternmentioning
confidence: 99%
“…A:12 L. Yeo et al these scenarios in the workflow [Gupta and Winstead 2007;Peterson and Steven 2006;Phillips and Swiler 1998]. The model could also be extended to consider the additional risk reduction afforded by the purchase of so-called "cyberinsurance."…”
Section: Appendix a Data Generationmentioning
confidence: 99%
“…Methods in this group include a broad class of generic data gathering techniques, such as questionnaires and surveys, interviews, and analysis of existing documentation. [8]…”
Section: A Traditional Techniquesmentioning
confidence: 99%