Authors
Raimundas Matulevicius, Nicolas Mayer, Patrick Heymans
Publication date
2008/3/4
Conference
2008 Third International Conference on Availability, Reliability and Security
Pages
1397-1404
Publisher
IEEE
Description
It is recognised that security has to be addressed through the whole system development process. However current practices address security only in late stages, i.e., development or maintenance. Due to the success of UML use cases, misuse cases have been accepted by industry as a means to tackle security. However misuse cases, firstly, lack a precise application process, secondly, are too general which results in under-definition or misinterpretation of their concepts. In this paper we examine misuse cases in the light of a reference model for information system security risk management (ISSRM). Using the well-known Meeting Scheduler example we show how misuse cases can be used to follow a security risk management process. Next we check the misuse case ontology according to the concepts found in current risk management standards. The paper suggests improvements for the conceptual …
Total citations
200820092010201120122013201420152016201720182019202020212022202320245631116856613976342
Scholar articles
R Matulevicius, N Mayer, P Heymans - 2008 Third International Conference on Availability …, 2008