Srivratanakul, Thitima, Clark, John Andrew orcid.org/0000-0002-9230-9739 and Polack, Fiona orcid.org/0000-0001-7954-6433 (2004) Writing Effective Security Abuse Cases. Report. York Computer Science Technical Report . Department of Computer Science, University of York
Abstract
We grow increasingly dependent on the appropriate operation of computer-based systems. One aspect of such systems is security. As systems become more complex current means of analysis will probably prove ineffective. In the safety domain a variety of analysis techniques has emerged over many years. These have proved surprisingly effective. Since the safety and security domains share many similarities, various authors have suggested that safety techniques might usefully find application in security. This report takes one such technique, HAZOPs, and applies it to one widely used informal design component – UML’s use cases.
Metadata
Item Type: | Monograph |
---|---|
Authors/Creators: |
|
Keywords: | UML Use Cases,HAZOPS,Threat Model |
Dates: |
|
Institution: | The University of York |
Academic Units: | The University of York > Faculty of Sciences (York) > Computer Science (York) |
Depositing User: | Pure (York) |
Date Deposited: | 07 Jun 2012 19:23 |
Last Modified: | 28 Feb 2025 00:11 |
Status: | Published |
Publisher: | Department of Computer Science, University of York |
Series Name: | York Computer Science Technical Report |
Open Archives Initiative ID (OAI ID): | oai:eprints.whiterose.ac.uk:72500 |