2013
DOI: 10.1007/978-3-642-36285-9_68
|View full text |Cite
|
Sign up to set email alerts
|

Towards Security Risk-Oriented Misuse Cases

Abstract: Abstract. Security has turn out to be a necessity of information systems (ISs) and information per se. Nevertheless, existing practices report on numerous cases when security aspects were considered only at the end of the development process, thus, missing the systematic security analysis. Misuse case diagrams help identify security concerns at early stages of the IS development. Despite this fundamental advantage, misuse cases tend to be rather imprecise; they do not comply with security risk management strat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…This section gives a detailed review of related studies in the areas of misuses cases with risk assessment for improving safety. Misuse case has been investigated in the light of security, security risk management, security risk assessment and similar aspects as evidenced in [26]- [28].…”
Section: Literature Reviewmentioning
confidence: 99%
“…This section gives a detailed review of related studies in the areas of misuses cases with risk assessment for improving safety. Misuse case has been investigated in the light of security, security risk management, security risk assessment and similar aspects as evidenced in [26]- [28].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The contribution in [23] helps modeling and analyzing the system from an attacker (misuser) perspective which increases the chance of identifying threats that would have been ignored. Malicious behaviors are modeled by misuse cases that target use cases and countermeasures as security use cases that mitigate misuse cases.…”
Section: Issrm and Misuse Cases Diagrams Alignmentmentioning
confidence: 99%
“…To remedy this problem of guiding and integrating risk analysis for eliciting security requirements, there were alignments for based risk analysis methods those which don't use it, e.g: ISSRM / Secure Tropos [24], ISSRM / Misuse Cases [45], ISSRM / Mal activity [6], but these methods are semi-formal and don't offer full guidance.…”
Section: State Of the Artmentioning
confidence: 99%