Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information 2009
DOI: 10.1145/1558607.1558645
|View full text |Cite
|
Sign up to set email alerts
|

Meta-models for misuse cases

Abstract: Misuse Cases are recent UML constructs that can be used to specify the mal-acts against which a requirements engineer seeks guarantees from the designer. However, Misuse Cases have not been formally adopted in UML, and therefore lack a formal metamodel. This paper proposes a meta-model that covers graphical, textual and OCL models for Misuse Cases that augments the existing UML 2.0 Use Case meta-models..

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…It's a good tool to treat non-functional requirements [26] from the very beginning of development life cycle by avoiding premature design decisions [27]. The significance of employing MCM is that it enhances the communication between the developers and the stakeholders to agree on critical system solutions by regarding the trade-off analysis [28], and relates well with UCM and UML for Model Driven Development of secure software system [29][30]. Visaggio and de Rosa introduce a system to capture and reason software security knowledge for MCM [31][32], by means of similarity function.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…It's a good tool to treat non-functional requirements [26] from the very beginning of development life cycle by avoiding premature design decisions [27]. The significance of employing MCM is that it enhances the communication between the developers and the stakeholders to agree on critical system solutions by regarding the trade-off analysis [28], and relates well with UCM and UML for Model Driven Development of secure software system [29][30]. Visaggio and de Rosa introduce a system to capture and reason software security knowledge for MCM [31][32], by means of similarity function.…”
Section: Related Workmentioning
confidence: 99%
“…In our work, we aim to build a security knowledge base according to existing known SOs that can be used for MCM to elicit security requirements. Thus we adopt the SOs developed by Herzog et al [29] and Lasheras et al [18] whose works are mainly based on security risk analysis model with core concepts as Asset, Threat, Vulnerability and Countermeasure. In order to cooperate with MCM, we also add some other concepts discussed in [31] as Attack, Attacker and Security Goal to the core ontology.…”
Section: The Core Security Ontology For U/mcmmentioning
confidence: 99%
See 1 more Smart Citation
“…There are several proposals for meta-models of security requirements engineering: Hartong et al describe a metamodel of misuse cases [5]. Susi et al [6] give a meta model of Tropos.…”
Section: Related Workmentioning
confidence: 99%
“…While in a similar spirit to our approach, this work does not specify how the proposed approach is to be considered in the context of software development, or how the use of economics relates to security considerations. Finally, Hartong et al [39] seek to harmonise the representation of misuse and abuse cases into a single, UML-driven metamodel.…”
mentioning
confidence: 99%