Showing 1 - 4 results of 4 for search '"Misuse case"', query time: 0.06s Refine Results
  1. 1

    Misuse case modeling for secure e-tendering system by Mohd, Haslina, Muhammad Robie, Mohd Afdhal, Baharom, Fauziah, Nordin, Nazib, Muhd Darus, Norida, Saip, Mohamed Ali, Yasin, Azman, Zainol, Azida, Hashim, Nor Laily

    Published 2012
    “…This three interrelated attribute (consist of tender phase, threat and security countermeasure) are illustrated in misuse case for better understanding of the risk that may occurs in particular tender phase. …”
    Get full text
    Conference or Workshop Item
  2. 2

    A secured e-tendering modeling using misuse case approach by Mohd, Haslina, Robie, Muhammad Afdhal Muhammad, Baharom, Fauziah, Muhd Darus, Norida, Saip, Mohamed Ali, Yasin, Azman

    Published 2016
    “…Major risk factors relating to electronic transactions may lead to destructive impacts on trust and transparency in the process of tendering.Currently, electronic tendering (e-tendering) systems still remain uncertain in issues relating to legal and security compliance and most importantly it has an unclear security framework.Particularly, the available systems are lacking in addressing integrity, confidentiality, authentication, and non-repudiation in e-tendering requirements.Thus, one of the challenges in developing an e-tendering system is to ensure the system requirements include the function for secured and trusted environment.Therefore, this paper aims to model a secured e-tendering system using misuse case approach.The modeling process begins with identifying the e-tendering process, which is based on the Australian Standard Code of Tendering (AS 4120-1994).It is followed by identifying security threats and their countermeasure.Then, the e-tendering was modelled using misuse case approach.The model can contribute to e-tendering developers and also to other researchers or experts in the e-tendering domain.…”
    Conference or Workshop Item
  3. 3

    Adapting Rational Unified Process (RUP) approach in designing a secure e-Tendering model by Mohd, Haslina, Robie, Muhammad Afdhal Muhammad, Baharom, Fauziah, Muhd Darus, Norida, Saip, Mohamed Ali, Yasin, Azman

    Published 2016
    “…The e-Tendering design based on the RUP approach can contribute to e-Tendering developers and researchers in e-Tendering domain.In addition, this study also shows that the RUP is one of the best system development methodology that can be used as one of the research methodology in Software Engineering domain related to secured design of any observed application.This methodology has been tested in various studies in certain domains, such as in Simulation-based Decision Support, Security Requirement Engineering, Business Modeling and Secure System Requirement, and so forth.As a conclusion, these studies showed that the RUP one of a good research methodology that can be adapted in any Software Engineering (SE) research domain that required a few artifacts to be generated such as use case modeling, misuse case modeling, activity diagram, and initial class diagram from a list of requirements as identified earlier by the SE researchers…”
    Get full text
    Conference or Workshop Item
  4. 4

    A secured e-tendering model based on rational unified process (RUP) approach: inception and elaboration phases by Mohd, Haslina, Baharom, Fauziah, Muhd Darus, Norida, Saip, Mohamed Ali, Marzuki @ Matt, Zaharin, Yasin, Azman, Muhammad Robie, Muhammad Afdhal

    Published 2016
    “…This paper discusses the generation of use case, misuse case and class diagrams based on security mechanism that need to be embedded in the e-Tendering model.This study also found that, the RUP is one of the best system development methodology that can be used as one of the research methodology in the Software Engineering domain, especially related to secured design of any observed application.This methodology has been tested in various studies, such as in Simulation-based Decision Support, Security Requirement Engineering, Business Modeling and Secure System Requirement, and so forth.This study may contribute to the software industries in developing a secured system application in the future, and also to the secured system modeling domain.…”
    Get full text
    Article