Paying attention to authenticity, as a security requirement, in the early phases of the software life-cycle (such as requirement and-or design) can save project cost, time, and effort. However, in the ISO 25010 quality model which describes quality sub-characteristics, authenticity measures are not explicitly described, neither are they documented with sufficient details. This paper proposes a clear and precise way of measuring the “authenticity” sub-characteristic based on structural and functional size measurements. This combination can be used to identify the risk of authenticity violation in the design phase. An example of Facebook Web User Authentication is used to illustrate our proposed measurement.
CITATION STYLE
Hakim, H., Sellami, A., & Ben Abddallah, H. (2017). Analyzing the risk of authenticity violation based on the structural and functional sizes of UML sequence diagrams. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10158 LNCS, pp. 46–59). Springer Verlag. https://doi.org/10.1007/978-3-319-54876-0_4
Mendeley helps you to discover research relevant for your work.