International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II 2005
DOI: 10.1109/itcc.2005.199
|View full text |Cite
|
Sign up to set email alerts
|

Misuse case-based design and analysis of secure software architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2007
2007
2018
2018

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(22 citation statements)
references
References 6 publications
0
22
0
Order By: Relevance
“…[213] A decrease in the number of vulnerabilities is a side effect of verifiable correctness. Correctness can be largely ensured by adopting rigorous formal methods, but at high cost.…”
Section: Section 5 Sdlc Processes and Methods And The Security Of Sofmentioning
confidence: 99%
“…[213] A decrease in the number of vulnerabilities is a side effect of verifiable correctness. Correctness can be largely ensured by adopting rigorous formal methods, but at high cost.…”
Section: Section 5 Sdlc Processes and Methods And The Security Of Sofmentioning
confidence: 99%
“…The HIS has many users which may include secretaries, nurses, doctors, pharmacists, IT personnel, business office personnel and administrative personnel [19]. This system can include the following use cases: 1) Secretary entering patient information; 2) Nurse entering preliminary appointment information; 3) Doctor entering appointment findings; 4) Doctor transmitting pharmacy orders to the pharmacy; 5) Pharmacist receiving pharmacy order.…”
Section: Developing Abuse Casesmentioning
confidence: 99%
“…Research including [137,162], looks into ensuring that security requirements specified during the requirement phase are maintained in the architecture, such that the best-fitting architecture is selected with respect to the security requirements. In [137], Pauli et al employs use cases/misuse cases to systematically identify potential malicious behaviours in the architecture.…”
Section: Traceability and Conformancementioning
confidence: 99%
“…In [137], Pauli et al employs use cases/misuse cases to systematically identify potential malicious behaviours in the architecture. However, like many use case/misuse case-based approaches, the composition of functionality and its impact on security is rarely addressed at this level; instead, a component-based approach is considered in which each component is checked to ensure that it fulfils its role in achieving a security property (eg, privacy of data).…”
Section: Traceability and Conformancementioning
confidence: 99%
See 1 more Smart Citation