Misuse Cases for Identifying System Dependability Threats
Sindre Guttorm and
Opdahl Andreas L.
Journal of Information Privacy and Security, 2008, vol. 4, issue 2, 3-22
Abstract:
Misuse case analysis is a technique for early elicitation of security-related threats and requirements to planned information systems. Since the technique was first proposed in 2000, there have been many follow-up contributions both by the originators, their students and by other researchers. These contributions have focused partly on extensions and adaptations of the technique, and partly on empirical evaluations of its applicability. In this paper we review the work that has been done on misuse cases so far and point to future directions. In addition to the systematic review of previous work, this paper looks into the possibility of applying misuse cases for other dependability factors in addition to security and safety, providing examples where misuse cases are applied for availability, reliability, and robustness.
Date: 2008
References: Add references at CitEc
Citations:
Downloads: (external link)
http://hdl.handle.net/10.1080/2333696X.2008.10855837 (text/html)
Access to full text is restricted to subscribers.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:taf:uipsxx:v:4:y:2008:i:2:p:3-22
Ordering information: This journal article can be ordered from
http://www.tandfonline.com/pricing/journal/uips20
DOI: 10.1080/2333696X.2008.10855837
Access Statistics for this article
Journal of Information Privacy and Security is currently edited by Chuleeporn Changchit
More articles in Journal of Information Privacy and Security from Taylor & Francis Journals
Bibliographic data for series maintained by Chris Longhurst ().