Eliciting security requirements by misuse cases

被引:0
作者
Sindre, G
Opdahl, AL
机构
来源
37TH INTERNATIONAL CONFERENCE ON TECHNOLOGY OF OBJECT-ORIENTED LANGUAGES AND SYSTEMS, PROCEEDINGS | 2000年
关键词
use cases; requirements; security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Use case diagrams have proven quite helpful in requirements engineering, both for eliciting requirements and getting a better overview of requirements already stated However, not all kinds of requirements are equally well supported by use case diagrams. They are good for Junctional requirements, but poorer at e.g., security requirements; which often concentrate on what should not happen in the system. With the advent of e- and m-commerce applications security requirements are growing in importance, also for quite simple applications where a short lead time is important. Thus, it would be interesting to look into the possibility for applying use cases on this arena This paper suggests how this can be done, extending the diagrams with misuse cases. This new construct makes it possible to represent actions that the system should prevent together with those actions which if should support.
引用
收藏
页码:120 / 143
页数:24
相关论文
共 30 条
  • [1] [Anonymous], MANAGING ORG CHANGE
  • [2] [Anonymous], 1995, SUCCEEDING OBJECTS D
  • [3] [Anonymous], 1988, CASE STUDY RES DESIG
  • [4] [Anonymous], 1993, MANAGING CHANGE CASE
  • [5] AUER D, 1997, P EUROCAST 97
  • [6] AUER D, 1999, THESIS J KEPLER U LI
  • [7] DOBLER H, 1996, P 3 EUR US GROUP WOR
  • [8] DUCK JD, 1993, HARVARD BUSINESS NOV
  • [9] FAYAD ME, 1996, COMMUNICATIONS A FEB
  • [10] FRENCH WL, 1984, ORG DEV BEHAV SCI IN