Security use cases

151Citations
Citations of this article
97Readers
Mendeley users who have this article in their library.

Abstract

Although use cases are a popular modeling approach for engineering functional requirements, they are often misused when it comes to engineering security requirements because requirements engineers unnecessarily specify security architectural mechanisms instead of security requirements. After discussing the relationships between misuse cases, security use cases, and security mechanisms, this column provides examples and guidelines for properly specifying essential (i.e., requirements-level) security use cases.

Cite

CITATION STYLE

APA

Firesmith, D. G. (2003). Security use cases. Journal of Object Technology. Journal of Object Technology. https://doi.org/10.5381/jot.2003.2.3.c6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free