Although use cases are a popular modeling approach for engineering functional requirements, they are often misused when it comes to engineering security requirements because requirements engineers unnecessarily specify security architectural mechanisms instead of security requirements. After discussing the relationships between misuse cases, security use cases, and security mechanisms, this column provides examples and guidelines for properly specifying essential (i.e., requirements-level) security use cases.
CITATION STYLE
Firesmith, D. G. (2003). Security use cases. Journal of Object Technology. Journal of Object Technology. https://doi.org/10.5381/jot.2003.2.3.c6
Mendeley helps you to discover research relevant for your work.