Showing 1 - 4 results of 4 for search '"Misuse case"', query time: 0.07s Refine Results
  1. 1
  2. 2

    Finding and resolving security misusability with misusability cases by Faily, S, Fléchais, I

    Published 2014
    “…We describe the related work upon which misusability cases are based before presenting the approach, and illustrating its application using a case study example. …”
    Journal article
  3. 3

    Misuse, Abuse, and Reuse: Economic utility functions for characterising security requirements by Heitzenrater, C, Simpson, A

    Published 2016
    “…Despite this widespread adoption, aspects of the original misuse case concept have yet to receive a formal treatment in the literature. …”
    Conference item
  4. 4

    Anonymous reputation systems achieving full dynamicity from lattices by El Kaafarani, A, Katsumata, S, Solomon, R

    Published 2018
    “…However, to avoid abuse/misuse cases, a review-once-policy is also enforced, i.e., if a user tries to write a second review for the same product, his reviews will be publicly linkable. …”
    Conference item