Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Eliciting security requirements with misuse cases

Published: 01 January 2005 Publication History

Abstract

Use cases have become increasingly common during requirements engineering, but they offer limited support for eliciting security threats and requirements. At the same time, the importance of security is growing with the rise of phenomena such as e-commerce and nomadic and geographically distributed work. This paper presents a systematic approach to eliciting security requirements based on use cases, with emphasis on description and method guidelines. The approach extends traditional use cases to also cover misuse, and is potentially useful for several other types of extra-functional requirements beyond security.

Cited By

View all
  • (2024)Threat Modeling for AI Analysis: Towards the Usage of Misuse Case Templates and UML Diagrams for AI Experiment Description and Trajectory GenerationProceedings of the 2024 13th International Conference on Informatics, Environment, Energy and Applications10.1145/3653912.3653915(7-16)Online publication date: 21-Feb-2024
  • (2024)Expediting the design and development of secure cloud-based mobile appsInternational Journal of Information Security10.1007/s10207-024-00880-623:4(3043-3064)Online publication date: 1-Aug-2024
  • (2024)Assessing the Understandability and Acceptance of Attack-Defense Trees for Modelling Security RequirementsRequirements Engineering: Foundation for Software Quality10.1007/978-3-031-57327-9_3(39-56)Online publication date: 8-Apr-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Requirements Engineering
Requirements Engineering  Volume 10, Issue 1
January 2005
84 pages

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 01 January 2005

Author Tags

  1. Extra-functional requirements
  2. Requirements analysis
  3. Requirements determination
  4. Requirements elicitation
  5. Requirements specification
  6. Scenarios
  7. Security requirements
  8. Use cases

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Threat Modeling for AI Analysis: Towards the Usage of Misuse Case Templates and UML Diagrams for AI Experiment Description and Trajectory GenerationProceedings of the 2024 13th International Conference on Informatics, Environment, Energy and Applications10.1145/3653912.3653915(7-16)Online publication date: 21-Feb-2024
  • (2024)Expediting the design and development of secure cloud-based mobile appsInternational Journal of Information Security10.1007/s10207-024-00880-623:4(3043-3064)Online publication date: 1-Aug-2024
  • (2024)Assessing the Understandability and Acceptance of Attack-Defense Trees for Modelling Security RequirementsRequirements Engineering: Foundation for Software Quality10.1007/978-3-031-57327-9_3(39-56)Online publication date: 8-Apr-2024
  • (2023)SLR: From Saltzer and Schroeder to 2021…47 Years of Research on the Development and Validation of Security API RecommendationsACM Transactions on Software Engineering and Methodology10.1145/356138332:3(1-31)Online publication date: 27-Apr-2023
  • (2023)On-Demand Security Requirements Synthesis with Relational Generative Adversarial NetworksProceedings of the 45th International Conference on Software Engineering10.1109/ICSE48619.2023.00139(1609-1621)Online publication date: 14-May-2023
  • (2023)A new, evidence-based, theory for knowledge reuse in security risk analysisEmpirical Software Engineering10.1007/s10664-023-10321-y28:4Online publication date: 25-May-2023
  • (2022)Benchmark for Investigating the Security in Software Development PhasesProceedings of the 4th International Conference on Information Management & Machine Intelligence10.1145/3590837.3590860(1-12)Online publication date: 23-Dec-2022
  • (2022)Using or Misusing?Proceedings of the 27th ACM Conference on on Innovation and Technology in Computer Science Education Vol. 110.1145/3502718.3524823(491-497)Online publication date: 7-Jul-2022
  • (2022)Efficient secure DevOps using process mining and Attack Defense TreesProcedia Computer Science10.1016/j.procs.2022.09.079207:C(446-455)Online publication date: 1-Jan-2022
  • (2022)Assessing system of systems information security risk with OASoSISComputers and Security10.1016/j.cose.2022.102690117:COnline publication date: 1-Jun-2022
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media