4.2 Article

Eliciting security requirements with misuse cases

期刊

REQUIREMENTS ENGINEERING
卷 10, 期 1, 页码 34-44

出版社

SPRINGER
DOI: 10.1007/s00766-004-0194-4

关键词

security requirements; use cases; scenarios; extra-functional requirements; requirements elicitation; requirements determination; requirements specification; requirements analysis

向作者/读者索取更多资源

Use cases have become increasingly common during requirements engineering, but they offer limited support for eliciting security threats and requirements. At the same time, the importance of security is growing with the rise of phenomena such as e-commerce and nomadic and geographically distributed work. This paper presents a systematic approach to eliciting security requirements based on use cases, with emphasis on description and method guidelines. The approach extends traditional use cases to also cover misuse, and is potentially useful for several other types of extra-functional requirements beyond security.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.2
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据