Abstract
This paper introduces the Trust Obstacle Mitigation Model (TOMM), which uses the concept of trust assumptions to derive security obstacles, and the concept of misuse cases to model obstacles. The TOMM allows a development team to anticipate malicious behaviour with respect to the operational database application and to document a priori how this malicious behaviour should be mitigated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abiteboul, S., Agrawal, R., Bernstein, P., et al.: The Lowell Database Research Self-Assessment. Communications of the ACM 48(5), 111–118 (2005)
Stallings, W.: Business Data Communications, 5th edn. Pearson Prentice Hall, Upper Saddle River (2005)
Page, V., Dixon, M., Bielkowicz, P.: Object-Oriented Graceful Evolution Monitors. In: Konstantas, D., Léonard, M., Pigneur, Y., Patel, S. (eds.) OOIS 2003. LNCS, vol. 2817, pp. 46–59. Springer, Heidelberg (2003)
Anton, A.: Goal Identification and Refinement in the Specification of Software-Based Information Systems. Ph.D. Thesis, College of Computing Georgia Institute of Technology (1997)
Lamsweerde, A., Letier, E.: Integrating Obstacles in Goal-Driven Requirements Engineering. In: ICSE 1998 – 20th International Conference on Software Engineering, Kyoto, Japan, pp. 53–62 (1998)
Haley, C., Laney, R., Moffett, J., Nuseibeh, B.: The Effect of Trust Assumptions on the Elaboration of Security Requirements. In: Proceedings of the 12th International Requirements Engineering Conference (RE 2004), Kyoto, Japan, pp. 102–111 (2004)
Alexander, I.: Misuse Cases: Use Cases with Hostile Intent. IEEE Software 20(1), 58–66 (2003)
Sindre, G., Opdahl, A.: Eliciting Security Requirements by Misuse Cases. In: Proceedings of the 37th International Conference on Technology Object-Oriented Languages and Systems, Sydney, Australia, pp. 120–131 (2000)
Jürjens, J.: UMLsec: Extending UML for Secure Systems Development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412–425. Springer, Heidelberg (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Page, V., Laney, R., Dixon, M., Haley, C. (2006). Trust Obstacle Mitigation for Database Systems. In: Bell, D.A., Hong, J. (eds) Flexible and Efficient Information Handling. BNCOD 2006. Lecture Notes in Computer Science, vol 4042. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11788911_24
Download citation
DOI: https://doi.org/10.1007/11788911_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-35969-2
Online ISBN: 978-3-540-35971-5
eBook Packages: Computer ScienceComputer Science (R0)