Use Case Pitfalls: Top 10 Problems from Real Projects Using Use Cases
TOOLS '99 Proceedings of the Technology of Object-Oriented Languages and Systems
Misuse Cases: Use Cases with Hostile Intent
IEEE Software
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Privacy threats in a mobile enterprise social network
Information Security Tech. Report
Hi-index | 0.00 |
An information security system of public or private organization should be developed securely and cost-effectively by using security engineering and software engineering technologies, as well as a security requirement specification (SRS). We present the E-MUC model that is analysis and specification model of security requirement based on UML, and a development process by using E-MUC model. Our approach is based on the paradigm of Common Criteria (ISO/IEC 15408), that is an international evaluation criteria for information security products, and PP which is a common security functional requirement specification for specific types of information security product.