earticle

논문검색

Vulnerability Analysis Approach To Capturing Information System Safety Threats and Requirements

초록

영어

Abuse case has great support in identifying security threats and security requirements caused by outside attackers, but it has not been used to capture non-malicious deliberate acts for safety concerns that involves inside abusers. It is important to represent inside abusers in a model and distinguish them from inside intruders and outside attackers, since their behaviors are different. The intent of this paper is to propose a new extension of abuse case to identify deliberate acts of safety threats caused by inside abusers. A new notation vulnerable use case was introduced to express the actions that leads to threats from inside abusers, countermeasures were introduced by safety use cases, and new relationships were defined to clarify the interactions among use cases, vulnerable use cases, safety use cases and abuse cases. This enhanced model provided a way of capturing as much potential risks caused by inside abusers, and embed safety requirements in the early stage of the system development life cycle.

목차

Abstract
 1. Introduction
 2. Terminologies
 3. Related Works
  3.1. Objectives
 4. An Enhanced Abuse Case Model Including Inside Abuser
  4.1. Enhanced Abuse Case Modeling Processes
  4.2. Illustrative Example (e-healthcare system)
 5. Discussions
 6. Conclusions and Future Work
 References

저자정보

  • Oluwasefunmi, Arogundade Laboratory of Management Decision and Information Systems, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, 100190, China
  • Adio, Akinwale Department of Computer Science, University of Agriculture, Abeokuta, Ogun state, Nigeria
  • Zhi, Jin School of Electronics Engineering and Computer Science, Peking University, Beijing, 100871, China
  • Xiaoguang, Yang Laboratory of Management Decision and Information Systems, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, 100190, China

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.