Towards security risk-oriented misuse cases

15Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security has turn out to be a necessity of information systems (ISs) and information per se. Nevertheless, existing practices report on numerous cases when security aspects were considered only at the end of the development process, thus, missing the systematic security analysis. Misuse case diagrams help identify security concerns at early stages of the IS development. Despite this fundamental advantage, misuse cases tend to be rather imprecise; they do not comply with security risk management strategies, and, thus, could lead to misinterpretation of the security-related concepts. Such limitations could potentially result in poor security solutions. This paper applies a systematic approach to understand how misuse case diagrams could help model organisational assets, potential risks, and security countermeasures to mitigate these risks. The contribution helps understand how misuse cases could deal with security risk management and support reasoning for security requirements and their implementation in the software system. © 2013 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Soomro, I., & Ahmed, N. (2013). Towards security risk-oriented misuse cases. In Lecture Notes in Business Information Processing (Vol. 132 LNBIP, pp. 689–700). Springer Verlag. https://doi.org/10.1007/978-3-642-36285-9_68

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free