Lessons learned with the systems security engineering capability maturity model
ICSE '97 Proceedings of the 19th international conference on Software engineering
Misuse Case-Based Design and Analysis of Secure Software Architecture
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II - Volume 02
A Threat Model Driven Approach for Security Testing
ICSEW '07 Proceedings of the 29th International Conference on Software Engineering Workshops
Object-Oriented Software Engineering: Practical Software Development using UML and Java
Object-Oriented Software Engineering: Practical Software Development using UML and Java
Hi-index | 0.00 |
Many opportunities of use of systems also open doors for their misuse. Misuse of a system could manifest itself in a variety of forms. One common misuse of a system lies in security breaches. This research investigates tracing requirements and threats through a series of models to identify, maintain the visibility of, and ultimately help mitigate, security threats to a system. The proposed Tracking of REquirements And Threats (TREAT) approach is a model driven framework which blends together several known modeling techniques to conceptualize and design a secure software system. TREAT considers security requirements along with system requirements from the very inception of the software and traces them throughout the software lifecycle in between various software artifacts.