Vis enkel innførsel

dc.contributor.authorKarpati, Peter
dc.contributor.authorOpdahl, Andreas Lothe
dc.contributor.authorSindre, Guttorm
dc.date.accessioned2024-08-05T09:32:12Z
dc.date.available2024-08-05T09:32:12Z
dc.date.created2015-02-17T12:12:38Z
dc.date.issued2015
dc.identifier.issn0164-1212
dc.identifier.urihttps://hdl.handle.net/11250/3144388
dc.description.abstractMany techniques have been proposed for eliciting software security requirements during the early requirements engineering phase. However, few techniques so far provide dedicated views of security issues in a software systems architecture context. This is a problem, because almost all requirements work today happens in a given architectural context, and understanding this architecture is vital for identifying security vulnerabilities and corresponding mitigations. Misuse case maps attempt to provide an integrated view of security and architecture by augmenting use case maps with misuse case concepts. This paper evaluates misuse case maps through two controlled experiments where 33 and 54 ICT students worked on complex real-life intrusions described in the literature. The students who used misuse case maps showed significantly better understanding of intrusions and better ability to suggest mitigations than students who used a combination of two existing techniques as an alternative treatment. Misuse case maps were also perceived more favourably overall than the alternative treatment, and participants reported using misuse case maps more when solving their tasks.en_US
dc.language.isoengen_US
dc.publisherElsevieren_US
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/deed.no*
dc.titleInvestigating security threats in architectural context: Experimental evaluations of misuse case mapsen_US
dc.typeJournal articleen_US
dc.typePeer revieweden_US
dc.description.versionacceptedVersionen_US
dc.rights.holderCopyright 2015 Elsevieren_US
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode2
dc.identifier.doi10.1016/j.jss.2015.02.040
dc.identifier.cristin1222944
dc.source.journalJournal of Systems and Softwareen_US
dc.source.pagenumber90-111en_US
dc.subject.nsiVDP::Informasjons- og kommunikasjonssystemer: 321en_US
dc.subject.nsiVDP::Information and communication systems: 321en_US
dc.identifier.citationJournal of Systems and Software. 2015, 104, 90-111.en_US
dc.source.volume104en_US


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal