Goal identification and refinement in the specification of software-based information systems
Goal identification and refinement in the specification of software-based information systems
Integrating obstacles in goal-driven requirements engineering
Proceedings of the 20th international conference on Software engineering
UMLsec: Extending UML for Secure Systems Development
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
Business Data Communications (5th Edition)
Business Data Communications (5th Edition)
The Effect of Trust Assumptions on the Elaboration of Security Requirements
RE '04 Proceedings of the Requirements Engineering Conference, 12th IEEE International
The Lowell database research self-assessment
Communications of the ACM - Adaptive complex enterprises
Misuse Cases: Use Cases with Hostile Intent
IEEE Software
Security risk mitigation for information systems
BT Technology Journal
Hi-index | 0.00 |
This paper introduces the Trust Obstacle Mitigation Model (TOMM), which uses the concept of trust assumptions to derive security obstacles, and the concept of misuse cases to model obstacles. The TOMM allows a development team to anticipate malicious behaviour with respect to the operational database application and to document a priori how this malicious behaviour should be mitigated.