Using Abuse Case Models for Security Requirements Analysis.

John P. McDermott, Chris Fox

ACSAC '99: Proceedings of the 15th Annual Computer Security Applications Conference(1999)

引用 658|浏览281
暂无评分
摘要
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge of security engineering. Market forces are driving software practitioners who are not security specialists to develop software that requires security features. When these practitioners develop software solutions without appropriate security-specific processes and models, they sometimes fail to produce effective solutions.We have adapted a proven object-oriented modeling technique, use cases, to capture and analyze security requirements in a simple way. We call the adaptation an abuse case model. Its relationship to other security engineering work products is relatively simple, from a user perspective.
更多
查看译文
关键词
human factors,object-oriented methods,security of data,user interfaces,abuse case models,market forces,object oriented modeling technique,security engineering process,security engineering work products,security features,security requirements analysis,security-specific processes,software practitioners,software solutions,use cases,user perspective,
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要