Showing 1 - 20 results of 22 for search '"Misuse case"', query time: 0.14s Refine Results
  1. 1

    Catalogue-based guideline for misuse case by Khairuddin, Muhammad Asyraf, Abd Ghani, Abdul Azim, Zulzalil, Hazura, Hassan, Saadah

    Published 2022
    “…Misuse case is one of the security requirement elicitation techniques that are easy to use and learn. …”
    Article
  2. 2
  3. 3

    Finding and resolving security misusability with misusability cases by Faily, S, Fléchais, I

    Published 2014
    “…We describe the related work upon which misusability cases are based before presenting the approach, and illustrating its application using a case study example. …”
    Journal article
  4. 4

    Misuse case modeling for secure e-tendering system by Mohd, Haslina, Muhammad Robie, Mohd Afdhal, Baharom, Fauziah, Nordin, Nazib, Muhd Darus, Norida, Saip, Mohamed Ali, Yasin, Azman, Zainol, Azida, Hashim, Nor Laily

    Published 2012
    “…This three interrelated attribute (consist of tender phase, threat and security countermeasure) are illustrated in misuse case for better understanding of the risk that may occurs in particular tender phase. …”
    Get full text
    Conference or Workshop Item
  5. 5

    A secured e-tendering modeling using misuse case approach by Mohd, Haslina, Robie, Muhammad Afdhal Muhammad, Baharom, Fauziah, Muhd Darus, Norida, Saip, Mohamed Ali, Yasin, Azman

    Published 2016
    “…Major risk factors relating to electronic transactions may lead to destructive impacts on trust and transparency in the process of tendering.Currently, electronic tendering (e-tendering) systems still remain uncertain in issues relating to legal and security compliance and most importantly it has an unclear security framework.Particularly, the available systems are lacking in addressing integrity, confidentiality, authentication, and non-repudiation in e-tendering requirements.Thus, one of the challenges in developing an e-tendering system is to ensure the system requirements include the function for secured and trusted environment.Therefore, this paper aims to model a secured e-tendering system using misuse case approach.The modeling process begins with identifying the e-tendering process, which is based on the Australian Standard Code of Tendering (AS 4120-1994).It is followed by identifying security threats and their countermeasure.Then, the e-tendering was modelled using misuse case approach.The model can contribute to e-tendering developers and also to other researchers or experts in the e-tendering domain.…”
    Conference or Workshop Item
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Misuse, Abuse, and Reuse: Economic utility functions for characterising security requirements by Heitzenrater, C, Simpson, A

    Published 2016
    “…Despite this widespread adoption, aspects of the original misuse case concept have yet to receive a formal treatment in the literature. …”
    Conference item
  11. 11

    Analyzing security aspects during software design phase using attack-based analysis model by Hedayatpour, Saman, Kama, Mohd. Nazri, Chuprat, Suriayati

    Published 2014
    “…In this work we address this problem by defining a method for using known attacks' and threats' properties and behaviors instead of using a drawn misuse case for assessing potential risks in the developing software. …”
    Article
  12. 12

    The state of the art on secure software engineering: A systematic mapping study by Khan, Rafiq A., Khan, Siffat U., Muhammad Ilyas, Muhammad Ilyas, Idris, Mohd. Y.

    Published 2020
    “…The results show that the most frequently used SSE frameworks/models are "Microsoft Software Development Life Cycle (MS-SDL)", "Misuse case modeling", "Abuse case modeling", "Knowledge Acquisition for Automated Specification", "System Security Engineering-Capability Maturity Model (SSE-CMM)"and "Secure Tropos Methodology". …”
    Conference or Workshop Item
  13. 13

    Adapting Rational Unified Process (RUP) approach in designing a secure e-Tendering model by Mohd, Haslina, Robie, Muhammad Afdhal Muhammad, Baharom, Fauziah, Muhd Darus, Norida, Saip, Mohamed Ali, Yasin, Azman

    Published 2016
    “…The e-Tendering design based on the RUP approach can contribute to e-Tendering developers and researchers in e-Tendering domain.In addition, this study also shows that the RUP is one of the best system development methodology that can be used as one of the research methodology in Software Engineering domain related to secured design of any observed application.This methodology has been tested in various studies in certain domains, such as in Simulation-based Decision Support, Security Requirement Engineering, Business Modeling and Secure System Requirement, and so forth.As a conclusion, these studies showed that the RUP one of a good research methodology that can be adapted in any Software Engineering (SE) research domain that required a few artifacts to be generated such as use case modeling, misuse case modeling, activity diagram, and initial class diagram from a list of requirements as identified earlier by the SE researchers…”
    Get full text
    Conference or Workshop Item
  14. 14

    A secured e-tendering model based on rational unified process (RUP) approach: inception and elaboration phases by Mohd, Haslina, Baharom, Fauziah, Muhd Darus, Norida, Saip, Mohamed Ali, Marzuki @ Matt, Zaharin, Yasin, Azman, Muhammad Robie, Muhammad Afdhal

    Published 2016
    “…This paper discusses the generation of use case, misuse case and class diagrams based on security mechanism that need to be embedded in the e-Tendering model.This study also found that, the RUP is one of the best system development methodology that can be used as one of the research methodology in the Software Engineering domain, especially related to secured design of any observed application.This methodology has been tested in various studies, such as in Simulation-based Decision Support, Security Requirement Engineering, Business Modeling and Secure System Requirement, and so forth.This study may contribute to the software industries in developing a secured system application in the future, and also to the secured system modeling domain.…”
    Get full text
    Article
  15. 15

    Holistic Security and Safety for Factories of the Future by Eva Maia, Sinan Wannous, Tiago Dias, Isabel Praça, Ana Faria

    Published 2022-12-01
    “…The results of these misuse case simulations showed how the SMS-DT platform can intervene in two domains in the first scenario and three in the second one, resulting in correlating the alerts and reporting them to security operators in the multi-domain intelligent correlation dashboard.…”
    Get full text
    Article
  16. 16

    A Development of Hybrid Drug Information System Using Image Recognition by HwaMin Lee, Doo-Soon Park, Min-Hyung Choi

    Published 2015-04-01
    “…In order to prevent drug abuse or misuse cases and avoid over-prescriptions, it is necessary for medicine taker to be provided with detailed information about the medicine. …”
    Get full text
    Article
  17. 17

    A Review Of Forensic Analysis Techniques For Android Phones by Murtaza Ahmed, M.N.A. Khan

    Published 2017-07-01
    “… Mobile forensics analysis is the sub-domain of digital forensics, which addresses solving the minor technology misuse cases to substantial international digital crime cases. …”
    Get full text
    Article
  18. 18

    Anonymous reputation systems achieving full dynamicity from lattices by El Kaafarani, A, Katsumata, S, Solomon, R

    Published 2018
    “…However, to avoid abuse/misuse cases, a review-once-policy is also enforced, i.e., if a user tries to write a second review for the same product, his reviews will be publicly linkable. …”
    Conference item
  19. 19

    Towards a Security Reference Architecture for NFV by Abdulrahman Khalid Alnaim, Ahmed Mahmoud Alwakeel, Eduardo B. Fernandez

    Published 2022-05-01
    “…Representing threats as misuse cases that describe the modus operandi of attackers, we can find countermeasures to them in the form of security patterns, and we can build a security reference architecture (SRA). …”
    Get full text
    Article
  20. 20

    Moth: a hybrid threat model for improving software security testing by Omotunde, Habeeb Oladapo

    Published 2018
    “…This involved the combination of 3 threat modeling techniques namely misuse cases, attack trees and finite state machines in order to harness their individual strengths to design a Hybrid Threat Modeling framework and tool called MOTH (Modeling Threats using Hybrid techniques). …”
    Get full text
    Get full text
    Get full text
    Thesis