IDEAS home Printed from https://ideas.repec.org/a/igg/jisp00/v5y2011i4p8-30.html
   My bibliography  Save this article

A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements

Author

Listed:
  • O. T. Arogundade

    (Chinese Academy of Sciences, China)

  • A. T. Akinwale

    (University of Agriculture, Abeokuta, Nigeria)

  • Z. Jin

    (Peking University, China)

  • X. G. Yang

    (Chinese Academy of Sciences, China)

Abstract

This paper proposes an enhanced use-misuse case model that allows both safety and security requirements to be captured during requirements elicitation. The proposed model extends the concept of misuse case by incorporating vulnerable use case and abuse case notations and relations that allows understanding and modeling different attackers and abusers behaviors during early stage of system development life cycle and finishes with a practical consistent combined model for engineering safety and security requirements.The model was successfully applied using health care information system gathered through the university of Kansas HISPC project. The authors were able to capture both security and safety requirements necessary for effective functioning of the system. In order to enhance the integration of the proposed model into risk analysis, the authors give both textual and detailed description of the model. The authors compare the proposed approach with other existing methods that identify and analyze safety and security requirements and discovered that it captures more security and safety threats.

Suggested Citation

  • O. T. Arogundade & A. T. Akinwale & Z. Jin & X. G. Yang, 2011. "A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements," International Journal of Information Security and Privacy (IJISP), IGI Global, vol. 5(4), pages 8-30, October.
  • Handle: RePEc:igg:jisp00:v:5:y:2011:i:4:p:8-30
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jisp.2011100102
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jisp00:v:5:y:2011:i:4:p:8-30. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.