Back to Results
First PageMeta Content
Software requirements / Computing / Software project management / Abuse / Information security / Ident / Use case / Access control / Test case / Security / Software development / Computer security


Using Abuse Case Models for Security Requirements Analysis John McDermott and Chris Fox Department of Computer Science James Madison University Harrisonburg, Virginia[removed]E-mail: {mcdermot, fox}@cs.jmu.edu
Add to Reading List

Document Date: 2010-03-10 13:11:59


Open Document

File Size: 43,34 KB

Share Result on Facebook

City

San Francisco / Phoenix / /

Company

InternetBased Information Security Laboratory / Prentice-Hall / Script Kiddie Resources / Authorized / PIN Authorized / Warez Authorized / Microsoft / RATIONAL CORPORATION / /

Currency

USD / /

/

Event

Reorganization / /

Facility

Gannon University / /

IndustryTerm

Internet access / software engineering technology / work products / Internet-based information security lab / modified utilities / configured host systems / software tools / hypothetical attack tool / trustworthy information security products / software practitioners / model solution / public key authentication algorithm / system software / public web site / modified system utilities / security engineering work products / find solutions / security policy then lab server / cryptographic algorithms / Internet-based information security laboratory / Internet-Based Information Security Lab Here / lab server / Internet-Based Information Security Lab An example / bank card / software solutions / interaction protocols / /

NaturalFeature

Communications Channel / /

OperatingSystem

Linux / Windows NT / /

Organization

Chris Fox Department of Computer Science James Madison University Harrisonburg / COMMON CRITERIA IMPLEMENTATION BOARD / Gannon University / /

Person

Dispatcher / Addison Wesley / Script Kiddie / Mary Smith / Nazgul / Malicious Student / Chris Fox / John McDermott / /

Position

editor / actor / teller / Manager / security specialist / manager of a target host / Q. The RRA97 model for role-base administration / Clerk / abuse case model for the Internet-based information security lab / available file manager / file manager / abusing actor / manager / debugger / editor / tools and systems actor / root/administrator / administrator / manager / a debugger / a programming editor / Lab Administrator / /

Product

Warez 2 / /

ProgrammingLanguage

Unified Modeling Language / /

ProvinceOrState

California / Arizona / /

PublishedMedium

The Student / /

Technology

IPv6 / Fast Ethernet / Point-to-Point Tunneling Protocol / Linux / Information Technology / ATM / secure shell / TCP/IP protocol / operating systems / public key authentication algorithm / interaction protocols / software engineering technology / IPv4 / network protocols / GUI / /

URL

http /

SocialTag