Abuse-Case-Based Assurance Arguments

  • Authors:
  • J. McDermott

  • Affiliations:
  • -

  • Venue:
  • ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
  • Year:
  • 2001

Quantified Score

Hi-index 0.01

Visualization

Abstract

This paper describes an extension to abuse-case-based security requirements analysis that provides alightweight means of increasing assurance in securityrelevant software. The approach is adaptable tolightweight software development processes but resultsin a concrete and explicit assurance argument. Likeabuse-case-based security requirements analysis, thisapproach is suitable for use in projects without securityexperts. When used in this way (without security experts)it will not produce as much assurance as the moretraditional alternatives, but arguably give better resultsthan ad hoc consideration of security issues.