Misuse cases + assets + security goals

Takao Okubo*, Kenji Taguchi, Nobukazu Yoshioka

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

Security is now the most critical feature of any, computing systems. Eliciting and analyzing security requirements, in the early stages of the system development process is highly, recommended to reduce security vulnerabilities which might be, found in the later stages of the system development process. In, order to address this issue, we will propose a new extension, of the misuse case diagram for analyzing and eliciting security, requirements with special focus on assets and security goals. We, will also present the process model in which business requirements, and system requirements related to security features are, separately analyzed and elicited in different phases. This process, model helps us to analyze the requirements related to business, goals in an earlier phase and to the system goals in a later phase, so that any concerns related to them are dealt with separately.We will illustrate our approach with a case study taken from an, accounting software package.

Original languageEnglish
Title of host publicationProceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE 2009 - 2009 IEEE International Conference on Privacy, Security, Risk, and Trust, PASSAT 2009
Pages424-429
Number of pages6
DOIs
Publication statusPublished - 2009
Externally publishedYes
Event2009 IEEE International Conference on Privacy, Security, Risk, and Trust, PASSAT 2009 - Vancouver, BC, Canada
Duration: 2009 Aug 292009 Aug 31

Publication series

NameProceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE 2009
Volume3

Conference

Conference2009 IEEE International Conference on Privacy, Security, Risk, and Trust, PASSAT 2009
Country/TerritoryCanada
CityVancouver, BC
Period09/8/2909/8/31

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Science Applications
  • Software

Fingerprint

Dive into the research topics of 'Misuse cases + assets + security goals'. Together they form a unique fingerprint.

Cite this