2020
DOI: 10.1109/access.2019.2963673
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Misuse Cases With Risk Assessment for Safety Requirements

Abstract: Risk-driven requirements elicitation represents an approach that allows assignment of appropriate countermeasure for the protection of the Information System (IS) depending on the risk level. Elicitation of safety requirements based on risk analysis is essential for those IS which will run on the open and dynamic Internet platform. Traditionally, misuse cases are used to find the weak points of an IS but cannot differentiate between the weak point that can lead to lenient hazard and/or serious hazard. In this … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 24 publications
0
6
0
Order By: Relevance
“…Adoption is achieved by exploring threats from failures of the system itself and mistakes made by users. Arogundade demonstrated enhancement to misuse case method by introducing iterative risk assessment to improve proposed preventive actions [1].…”
Section: B Safety Analysis Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Adoption is achieved by exploring threats from failures of the system itself and mistakes made by users. Arogundade demonstrated enhancement to misuse case method by introducing iterative risk assessment to improve proposed preventive actions [1].…”
Section: B Safety Analysis Methodsmentioning
confidence: 99%
“…One of the main advantages of using misuse cases for security is to show a series of unwanted actions from different perspectives sequentially [1]. By adopting misuse cases, the same benefit is gained for safety analysis.…”
Section: B Safety Analysis Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Project specifications should be of high quality to reduce failure of software products such as code and test cases [ 7 , 12 ]. Arogundade et al [ 15 ] examined and identified concepts that constitute a modeling technique for the safety risk assessment of the Information System (IS) and developed a conceptual model for the achievement of the safety risk assessment of the IS during the requirement analysis phase of the software process.…”
Section: Methodsmentioning
confidence: 99%
“…This information can be supplemented to other hazard analysis techniques to find the potential effects of that particular failure on the system and also to find potential safety guards to ensure the safety of the system. The extracted information from v_FTG can also be used to revise the safety requirements of a collaborative CPS [28].…”
Section: ) Relationship Between Hazard Analysis Techniquesmentioning
confidence: 99%