2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion 2011
DOI: 10.1109/ssiri-c.2011.29
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Use Cases with Subjective Risk Assessment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…It explicitly conveys each actor's goals. We extended the use case concept with object and action in order to give room for security policy specification Arogundade et al, (2011). It will make it easy to specify what should be protected and actions that should be allowed by different actor.…”
Section: Brief Description Of Security Ontology (So) Conceptual Viewmentioning
confidence: 99%
See 1 more Smart Citation
“…It explicitly conveys each actor's goals. We extended the use case concept with object and action in order to give room for security policy specification Arogundade et al, (2011). It will make it easy to specify what should be protected and actions that should be allowed by different actor.…”
Section: Brief Description Of Security Ontology (So) Conceptual Viewmentioning
confidence: 99%
“…Closing this gap is one of the purposes of our approach. In our earlier work we have proposed a framework for modeling safety and security requirements of information system during the development process (Arogundade et al, 2011). The model was later enhanced and developed into use-misuse case security ontology (Arogundade et al 2012) In practice, the ISS risk assessment is quite complex and full of uncertainty.…”
Section: Introductionmentioning
confidence: 99%