Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99)
DOI: 10.1109/csac.1999.816013
|View full text |Cite
|
Sign up to set email alerts
|

Using abuse case models for security requirements analysis

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
195
0
3

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 276 publications
(211 citation statements)
references
References 5 publications
0
195
0
3
Order By: Relevance
“…The results are intended to be used as the basis for the specification of security requirements. Prominent methods and techniques (amongst others) are abuse cases [41], misuse cases [42], and attack trees [43]. Other frequently mentioned methods in the context of SRE are intended to improve the capabilities for modeling security requirements or security-specific information.…”
Section: Sre Methodsmentioning
confidence: 99%
“…The results are intended to be used as the basis for the specification of security requirements. Prominent methods and techniques (amongst others) are abuse cases [41], misuse cases [42], and attack trees [43]. Other frequently mentioned methods in the context of SRE are intended to improve the capabilities for modeling security requirements or security-specific information.…”
Section: Sre Methodsmentioning
confidence: 99%
“…An abuse case is defined as a specification of a type of complete interaction between a system and one or more actors, where the results of the interaction are harmful to the system, one of the actors, or one of the stakeholders of the system [6]. Also, Guttorm and Opdahl [32] define the concept of a misuse case, the inverse of a use case, which describes a function that the system should not allow.…”
Section: Related Workmentioning
confidence: 99%
“…McDermott and Fox adapt use cases [6] to capture and analyse security requirements, and they call the adaption an abuse case model [6]. An abuse case is defined as a specification of a type of complete interaction between a system and one or more actors, where the results of the interaction are harmful to the system, one of the actors, or one of the stakeholders of the system [6].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Abuse frames share the same notation as the normal problem frames, but each domain is now associated with a different meaning. McDermott and Fox adapt use cases [44] to capture and analyze security requirements, and they call the adaption an abuse case model. An abuse case is an interaction between a system and one or more actors, where the results of the interaction are harmful to the system, or one of the stakeholders of the system.…”
Section: Security Requirements Engineering: a Surveymentioning
confidence: 99%