Elaborating Security Requirements by Construction of Intentional Anti-Models
Proceedings of the 26th International Conference on Software Engineering
Misuse and Abuse Cases: Getting Past the Positive
IEEE Security and Privacy
Web services enterprise security architecture: a case study
Proceedings of the 2005 workshop on Secure web services
Defects in automotive use cases
Proceedings of the 2006 ACM/IEEE international symposium on Empirical software engineering
Security risk mitigation for information systems
BT Technology Journal
Model-based security analysis in seven steps --- a guided tour to the CORAS method
BT Technology Journal
Science of Computer Programming
Aspect-oriented specification of threat-driven security requirements
International Journal of Computer Applications in Technology
Developing web services security systems: a case study
International Journal of Web Engineering and Technology
Secure information systems engineering: a manifesto
International Journal of Electronic Security and Digital Forensics
Executable misuse cases for modeling security concerns
Proceedings of the 30th international conference on Software engineering
Managing quality requirements using activity-based quality models
Proceedings of the 6th international workshop on Software quality
Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams
MoDELS '08 Proceedings of the 11th international conference on Model Driven Engineering Languages and Systems
Addressing degraded service outcomes and exceptional modes of operation in behavioural models
Proceedings of the 2008 RISE/EFTS Joint International Workshop on Software Engineering for Resilient Systems
Requirements-based Access Control Analysis and Policy Specification (ReCAPS)
Information and Software Technology
Web Services-Based Security Requirement Elicitation
IEICE - Transactions on Information and Systems
DREP: A Requirements Engineering Process for Dependable Reactive Systems
Methods, Models and Tools for Fault Tolerance
A Method for Extracting Unexpected Scenarios of Embedded Systems
Proceedings of the 2006 conference on Knowledge-Based Software Engineering: Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering
Proceedings of the 2006 conference on Knowledge-Based Software Engineering: Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering
A Conceptual Model for Analysis Method of Extracting Unexpected Obstacles of Embedded Systems
Proceedings of the 2008 conference on Knowledge-Based Software Engineering: Proceedings of the Eighth Joint Conference on Knowledge-Based Software Engineering
Requirements Engineering Education for Professional Engineers
Proceedings of the 2008 conference on Knowledge-Based Software Engineering: Proceedings of the Eighth Joint Conference on Knowledge-Based Software Engineering
Modeling of secure data extraction in ETL processes using UML 2.0
AsiaMS '07 Proceedings of the IASTED Asian Conference on Modelling and Simulation
Moving from Requirements to Design Confronting Security Issues: A Case Study
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part II
Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application
ER '09 Proceedings of the ER 2009 Workshops (CoMoL, ETheCoM, FP-UML, MOST-ONISW, QoIS, RIGiM, SeCoGIS) on Advances in Conceptual Modeling - Challenging Perspectives
A suggestion for analysis of unexpected obstacles in embedded system
Proceedings of the 2007 conference on Human interface: Part I
Towards evidence-based architectural design for safety-critical software applications
Architecting dependable systems IV
A comparison of two approaches to safety analysis based on use cases
ER'07 Proceedings of the 26th international conference on Conceptual modeling
Towards CIM to PIM transformation: from secure business processes defined in BPMN to use-cases
BPM'07 Proceedings of the 5th international conference on Business process management
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Monitor petri nets for security monitoring
Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems
Comparing safety analysis based on sequence diagrams and textual use cases
CAiSE'10 Proceedings of the 22nd international conference on Advanced information systems engineering
Introducing mitigation use cases to enhance the scope of test cases
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
Addressing software application security issues
ICCOMP'06 Proceedings of the 10th WSEAS international conference on Computers
Discovering Multidimensional Correlations among Regulatory Requirements to Understand Risk
ACM Transactions on Software Engineering and Methodology (TOSEM)
Environment-driven threats elicitation for web applications
KES-AMSTA'11 Proceedings of the 5th KES international conference on Agent and multi-agent systems: technologies and applications
A graphical approach to risk identification, motivated by empirical investigations
MoDELS'06 Proceedings of the 9th international conference on Model Driven Engineering Languages and Systems
Towards developing consistent misuse case models
Journal of Systems and Software
Building security requirements using state transition diagram at security threat location
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Managing architectural design decisions for safety-critical software systems
QoSA'06 Proceedings of the Second international conference on Quality of Software Architectures
Enhanced misuse case model: a security requirement analysis and specification model
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
Trust obstacle mitigation for database systems
BNCOD'06 Proceedings of the 23rd British National Conference on Databases, conference on Flexible and Efficient Information Handling
Using dependent CORAS diagrams to analyse mutual dependency
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
TAM2: automated threat analysis
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Mathematical and Computer Modelling: An International Journal
A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements
International Journal of Information Security and Privacy
Secure by Design: Developing Secure Software Systems from the Ground Up
International Journal of Secure Software Engineering
The Effect of Firewall Testing Types on Cloud Security Policies
International Journal of Strategic Information Technology and Applications
Using SMCD to reduce inconsistencies in misuse case models: A subject-based empirical evaluation
Journal of Systems and Software
Comparing attack trees and misuse cases in an industrial setting
Information and Software Technology
Hi-index | 0.00 |
A misuse case is the negative form of a use case; it documents a negative scenario. Its actor is an agent with hostile intent toward the system under design. The relationships between use and misuse cases document threats and their mitigations. Use- and misuse-case diagrams (shown in the article) are valuable in threat and hazard analysis, system design, eliciting requirements, and generating test cases.