-
1
-
2
Finding and resolving security misusability with misusability cases
Published 2014“…We describe the related work upon which misusability cases are based before presenting the approach, and illustrating its application using a case study example. …”
Journal article -
3
Misuse, Abuse, and Reuse: Economic utility functions for characterising security requirements
Published 2016“…Despite this widespread adoption, aspects of the original misuse case concept have yet to receive a formal treatment in the literature. …”
Conference item -
4
Anonymous reputation systems achieving full dynamicity from lattices
Published 2018“…However, to avoid abuse/misuse cases, a review-once-policy is also enforced, i.e., if a user tries to write a second review for the same product, his reviews will be publicly linkable. …”
Conference item