Trust obstacle mitigation for database systems

  • Authors:
  • Victor Page;Robin Laney;Maurice Dixon;Charles Haley

  • Affiliations:
  • Department of Computing, Communications Technology and Mathematics, London Metropolitan University, London;Department of Computing, The Open University, Milton Keynes;Department of Computing, Communications Technology and Mathematics, London Metropolitan University, London;Department of Computing, The Open University, Milton Keynes

  • Venue:
  • BNCOD'06 Proceedings of the 23rd British National Conference on Databases, conference on Flexible and Efficient Information Handling
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper introduces the Trust Obstacle Mitigation Model (TOMM), which uses the concept of trust assumptions to derive security obstacles, and the concept of misuse cases to model obstacles. The TOMM allows a development team to anticipate malicious behaviour with respect to the operational database application and to document a priori how this malicious behaviour should be mitigated.