Writing Effective Security Abuse Cases

Book English OPEN
Srivratanakul, Thitima; Clark, John Andrew; Polack, Fiona;
(2004)
  • Publisher: Department of Computer Science, University of York

We grow increasingly dependent on the appropriate operation of computer-based systems. One aspect of such systems is security. As systems become more complex current means of analysis will probably prove ineffective. In the safety domain a variety of analysis techniques... View more
  • References (8)

    d [62] Schneier, B., 1999. Attack Trees. Dr. Dobb's Journal December 1999. Available from:

    http://www.ddj.com/articles/1999/9912/ [63] Sindre, G. and Opdahl, A.L., 2000. Eliciting Security Requirements by Misuse Cases.

    In: Proceedings of TOOLS Pacific 2000, 20-23 Nov. 2000 (120-131). [64] Srivatanakul, T., Clark, J., and Polack, F. 2004. Security Zonal Analysis. Technical

    Report, YCS-374, Department of Computer Science, University of York, 2004. [65] Trusted Computer System Evaluation Criteria, a.k.a. “The Orange Book” DoD 5200.28-

    STD, December 1985 (supersedes 1983 CSC-STD-00l-83).

    http://www.radium.ncsc.mil/tpep/library/rainbow/5200.28-STD.html [66] UK Ministry of Defence, 1996. Defence Standard 00-56 Issue 1: Safety Management

    Requirements for Defence Systems. [67] UK Ministry of Defence, 1996. Defence Standard 00-56 Issue 2: Safety Management

    Requirements for Defence Systems. [68] UK Ministry of Defence, 1996. Defence Standard 00-58: HAZOP Studies on Systems

  • Related Organizations (4)
  • Metrics
Share - Bookmark