Misuse case-based design and analysis of secure software architecture
2005pp. 398–403 Vol. 2
Citations Over TimeTop 11% of 2005 papers
Abstract
This paper presents an approach to the architectural design and analysis of secure software systems based on the system requirements elicited in the form of use cases and misuse cases. We identify architectural components and their connections and analyze whether or not a candidate architecture can address security concerns. This provides a smooth transition from requirements specification to high-level design for engineering secure software systems, and greatly improves the traceability of security concerns, which allows a system developer to know what requirement an architectural component references back to. We demonstrate our approach through a case study on a security-intensive hospital information system.
Related Papers
- → Monitoring Requirements Evolution using Views(2007)13 cited
- → Process patterns for requirement consistency analysis(2016)2 cited
- A process for use of multimedia information in requirements identification and traceability(1992)
- Towards a Multi-views Approach for Software Requirement Engineering: Requirements Management Tools(2016)
- Novel For Requirement Management and Traceability Module(2019)