By the same authors

Writing Effective Security Abuse Cases

Research output: Book/ReportOther report

Full text download(s)

Author(s)

Department/unit(s)

Publication details

DatePublished - 2004
Number of pages52
PublisherDepartment of Computer Science, University of York
Original languageEnglish

Publication series

NameYork Computer Science Technical Report
PublisherDepartment of Computer Science, University of York
No.YCS-2004-375
VolumeYCS

Abstract

We grow increasingly dependent on the appropriate operation of computer-based systems. One aspect of such systems is security. As systems become more complex current means of analysis will probably prove ineffective. In the safety domain a variety of analysis techniques has emerged over many years. These have proved surprisingly effective. Since the safety and security domains share many similarities, various authors have suggested that safety techniques might usefully find application in security. This report takes one such technique, HAZOPs, and applies it to one widely used informal design component – UML’s use cases.

    Research areas

  • UML Use Cases, HAZOPS, Threat Model

Discover related content

Find related publications, people, projects, datasets and more using interactive charts.

View graph of relations