dc.creatorFernández, Eduardo B.
dc.creatorVan Hilst, Michael
dc.creatorLarrondo Petrie, Maria M.
dc.creatorHuang, Shihong
dc.date2006-08
dc.date2006-08
dc.date2012-11-12T19:06:51Z
dc.identifierhttp://sedici.unlp.edu.ar/handle/10915/24047
dc.identifierisbn:0-387-34828-X
dc.descriptionAn important aspect of security requirements is the understanding and listing of the possible threats to the system. Only then can we decide what specific defense mechanisms to use. We show here an approach to list all threats by considering each action in each use case and analyzing how it can be subverted by an internal or external attacker. From this list we can deduce what policies are necessary to prevent or mitigate the threats. These policies can then be used as guidelines for design. The proposed method can include formal design notations for validation and verification.
dc.description1st International Workshop on Advanced Software Engineering: Expanding the Frontiers of Software Technology - Session 3: Software Development Process
dc.descriptionRed de Universidades con Carreras en Informática (RedUNCI)
dc.formatapplication/pdf
dc.languageen
dc.relation19 th IFIP World Computer Congress - WCC 2006
dc.rightshttp://creativecommons.org/licenses/by-nc-sa/2.5/ar/
dc.rightsCreative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5)
dc.subjectCiencias Informáticas
dc.titleDefining security requirements through misuse actions
dc.typeObjeto de conferencia
dc.typeObjeto de conferencia


Este ítem pertenece a la siguiente institución