EconPapers    
Economics at your fingertips  
 

A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements

O. T. Arogundade, A. T. Akinwale, Z. Jin and X. G. Yang
Additional contact information
O. T. Arogundade: Chinese Academy of Sciences, China
A. T. Akinwale: University of Agriculture, Abeokuta, Nigeria
Z. Jin: Peking University, China
X. G. Yang: Chinese Academy of Sciences, China

International Journal of Information Security and Privacy (IJISP), 2011, vol. 5, issue 4, 8-30

Abstract: This paper proposes an enhanced use-misuse case model that allows both safety and security requirements to be captured during requirements elicitation. The proposed model extends the concept of misuse case by incorporating vulnerable use case and abuse case notations and relations that allows understanding and modeling different attackers and abusers behaviors during early stage of system development life cycle and finishes with a practical consistent combined model for engineering safety and security requirements.The model was successfully applied using health care information system gathered through the university of Kansas HISPC project. The authors were able to capture both security and safety requirements necessary for effective functioning of the system. In order to enhance the integration of the proposed model into risk analysis, the authors give both textual and detailed description of the model. The authors compare the proposed approach with other existing methods that identify and analyze safety and security requirements and discovered that it captures more security and safety threats.

Date: 2011
References: Add references at CitEc
Citations:

Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 4018/jisp.2011100102 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:igg:jisp00:v:5:y:2011:i:4:p:8-30

Access Statistics for this article

International Journal of Information Security and Privacy (IJISP) is currently edited by Yassine Maleh

More articles in International Journal of Information Security and Privacy (IJISP) from IGI Global
Bibliographic data for series maintained by Journal Editor ().

 
Page updated 2025-03-19
Handle: RePEc:igg:jisp00:v:5:y:2011:i:4:p:8-30