IEEE - Institute of Electrical and Electronics Engineers, Inc. - Combining Misuse Cases with Attack Trees and Security Activity Models

2010 International Conference on Availability, Reliability, and Security (ARES)

Author(s): Tndel, I.A. ; Jensen, J. ; Rstad, L.
Publisher: IEEE - Institute of Electrical and Electronics Engineers, Inc.
Publication Date: 1 February 2010
Conference Location: Krakow, Poland, Poland
Conference Date: 15 February 2010
Page(s): 438 - 445
ISBN (CD): 978-0-7695-3965-2
ISBN (Electronic): 978-1-4244-5880-6
ISBN (Paper): 978-1-4244-5879-0
DOI: 10.1109/ARES.2010.101
Regular:

Misuse cases and attack trees have been suggested for security requirements elicitation and threat modeling in software projects. Their use is believed to increase security awareness throughout... View More

Advertisement