Misuse case-based design and analysis of secure software architecture

JJ Pauli, D Xu�- …�Technology: Coding and Computing (ITCC'05)�…, 2005 - ieeexplore.ieee.org
International Conference on Information Technology: Coding and�…, 2005ieeexplore.ieee.org
This paper presents an approach to the architectural design and analysis of secure software
systems based on the system requirements elicited in the form of use cases and misuse
cases. We identify architectural components and their connections and analyze whether or
not a candidate architecture can address security concerns. This provides a smooth
transition from requirements specification to high-level design for engineering secure
software systems, and greatly improves the traceability of security concerns, which allows a�…
This paper presents an approach to the architectural design and analysis of secure software systems based on the system requirements elicited in the form of use cases and misuse cases. We identify architectural components and their connections and analyze whether or not a candidate architecture can address security concerns. This provides a smooth transition from requirements specification to high-level design for engineering secure software systems, and greatly improves the traceability of security concerns, which allows a system developer to know what requirement an architectural component references back to. We demonstrate our approach through a case study on a security-intensive hospital information system.
ieeexplore.ieee.org
Showing the best result for this search. See all results