期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Refining Use/Misuse/Mitigation Use Cases for Security Requirements
1
作者 joshua j. pauli 《Journal of Software Engineering and Applications》 2014年第8期626-638,共13页
We investigate security at the same time as the functional requirements by refining and integrating use, misuse, and mitigation use cases. Security requirements rely on the interactions among normal system execution (... We investigate security at the same time as the functional requirements by refining and integrating use, misuse, and mitigation use cases. Security requirements rely on the interactions among normal system execution (use cases), attacks (misuse cases), and necessary security strategies (mitigation use cases), but previous approaches only use a high-level of abstraction. We use refinement to uncover details of each case and the relationships among them before integrating them. We identify and model “includes” and “extends” relationships within each refined case type, and use a condition-driven process that maintains these relationships as refinement continues. We then systematically identify and model “threatens” and “mitigates” relationships to integrate the cases at a detailed level. 展开更多
关键词 USE CASE MISUSE CASE MITIGATION USE CASE Requirements SECURITY Engineering
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部