메뉴 건너뛰기




Volumn 85, Issue 2, 2012, Pages 323-339

Towards developing consistent misuse case models

Author keywords

Misuse cases; Model consistency; Use cases

Indexed keywords

DETRIMENTAL EFFECTS; END SYSTEMS; HIGH QUALITY; MISUSE CASE; MODEL CONSISTENCY; NATURAL LANGUAGES; REQUIREMENTS PHASE; SECURE SOFTWARE DEVELOPMENT; SECURITY REQUIREMENTS; SECURITY THREATS; USE CASE MODELING; USE CASES;

EID: 84355162916     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2011.08.023     Document Type: Conference Paper
Times cited : (12)

References (45)
  • 1
    • 0037240812 scopus 로고    scopus 로고
    • Misuse cases, use cases with hostile intent
    • I.F. Alexander Misuse cases, use cases with hostile intent IEEE Software 20 1 2003 58 66
    • (2003) IEEE Software , vol.20 , Issue.1 , pp. 58-66
    • Alexander, I.F.1
  • 3
    • 84855545256 scopus 로고    scopus 로고
    • last accessed October 2010
    • Ambler, S. Agile Modeling Website [Online]. Available at: http://www.agilemodeling.com/essays/whenIsAModelAgile.htm (last accessed October 2010).
    • Agile Modeling Website
    • Ambler, S.1
  • 4
    • 84881391264 scopus 로고    scopus 로고
    • Quality and understandability of use case models
    • ECOOP 2001 - Object-Oriented Programming
    • B. Anda, D. Sjøberg, and M. Jørgensen Quality and understandability in use case models J. Lindskov Knudsen, 15th European Conference Object-Oriented Programming (ECOOP) 2001 Springer Budapest 402 428 (Pubitemid 33291305)
    • (2001) Lecture Notes in Computer Science , Issue.2072 , pp. 402-428
    • Anda, B.1    Sjoberg, D.2    Jorgensen, M.3
  • 15
    • 84976742097 scopus 로고
    • Essential modeling: Use cases for user interfaces
    • L.L. Constantine Essential modeling: use cases for user interfaces ACM Interactactions 2 2 1995 34 46
    • (1995) ACM Interactactions , vol.2 , Issue.2 , pp. 34-46
    • Constantine, L.L.1
  • 16
    • 84905824485 scopus 로고    scopus 로고
    • A Comparative Evaluation of Three Approaches to Specifying Security Requirement
    • Luxembourg
    • M.H. Diallo, and J. Romero-Mariona A Comparative Evaluation of Three Approaches to Specifying Security Requirement REFSQ'06 Luxembourg 2006
    • (2006) REFSQ'06
    • Diallo, M.H.1    Romero-Mariona, J.2
  • 18
    • 36549066660 scopus 로고    scopus 로고
    • Producing robust use case diagrams via reverse engineering of use case descriptions
    • DOI 10.1007/s10270-006-0039-3
    • M. El-Attar, and J. Miller Producing robust use case diagrams via reverse engineering of use case descriptions Journal of Software and Systems Modeling 7 1 2008 67 83 (Pubitemid 350186821)
    • (2008) Software and Systems Modeling , vol.7 , Issue.1 , pp. 67-83
    • El-Attar, M.1    Miller, J.2
  • 19
    • 72449182846 scopus 로고    scopus 로고
    • A subject-based empirical evaluation of SSUCD's performance in reducing inconsistencies in use case models
    • M. El-Attar, and J. Miller A subject-based empirical evaluation of SSUCD's performance in reducing inconsistencies in use case models Journal of Empirical Software Engineering 14 5 2009 477 512
    • (2009) Journal of Empirical Software Engineering , vol.14 , Issue.5 , pp. 477-512
    • El-Attar, M.1    Miller, J.2
  • 20
    • 84855524863 scopus 로고    scopus 로고
    • EPC, Global, Boston, MA [Online July, 2005]. Available: (last accessed October 2010)
    • EPC, Global, Boston, MA, "EPC global architecture framework version 1.0," [Online July, 2005]. Available: http://www.epcglobalinc.org/ standards/ (last accessed October 2010).
    • EPC Global Architecture Framework Version 1.0
  • 22
    • 0004907769 scopus 로고    scopus 로고
    • Use case formats: Requirements, analysis, and design
    • R.J. Harwood Use case formats: requirements, analysis, and design Journal of Object-Oriented Programming 9 8 1997 54 57
    • (1997) Journal of Object-Oriented Programming , vol.9 , Issue.8 , pp. 54-57
    • Harwood, R.J.1
  • 26
    • 84855561068 scopus 로고    scopus 로고
    • RFID Case Study. Dr. Mohamed El-Attar's Research Website [Online]. Available at: (last updated March 2011)
    • RFID Case Study. Dr. Mohamed El-Attar's Research Website [Online]. Available at: http://faculty.kfupm.edu.sa/ICS/melattar/RFID.htm (last updated March 2011).
  • 30
    • 79959296751 scopus 로고    scopus 로고
    • Use case pitfalls: Top 10 problems from real projects using use cases
    • IEEE Computer Society
    • S. Lilly Use case pitfalls: top 10 problems from real projects using use cases Proceedings of TOOLS USA'99 1999 IEEE Computer Society
    • (1999) Proceedings of TOOLS USA'99
    • Lilly, S.1
  • 31
  • 33
    • 60949090741 scopus 로고    scopus 로고
    • Department of Computer and Information Science Trondheim, Norway NTNU. Master
    • M. Mæhre Industrial Experiences with Misuse Cases 2005 Department of Computer and Information Science Trondheim, Norway NTNU. Master
    • (2005) Industrial Experiences with Misuse Cases
    • Mæhre, M.1
  • 34
    • 84855552946 scopus 로고    scopus 로고
    • Near Field Communication NFC Forum Available: (last accessed October 2010)
    • Near Field Communication NFC Forum [Online] 2007 Available: http://www.nfc-forum.org/aboutus/ (last accessed October 2010)
    • (2007) NFC Forum [Online]
  • 35
    • 0003683075 scopus 로고    scopus 로고
    • OMG Object Management Group, Inc. (cited 21.11.03)
    • OMG Unified Modeling Language, version 1.5 2003 Object Management Group, Inc. http://www.uml.org (cited 21.11.03)
    • (2003) Unified Modeling Language, Version 1.5
  • 41
    • 84855531909 scopus 로고    scopus 로고
    • Standing Committee Voting System at King Fahd University of Petroleum and Minerals. Available at: (last accessed October 2010)
    • Standing Committee Voting System at King Fahd University of Petroleum and Minerals. Available at: http://www2.kfupm.edu.sa/ovs/VLogin.aspx (last accessed October 2010).
  • 42
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • G. Sindre, and A. Opdahl Eliciting security requirements with misuse cases Requirements Engineering Journal vol10 2005 34 44
    • (2005) Requirements Engineering Journal , vol.10 , pp. 34-44
    • Sindre, G.1    Opdahl, A.2
  • 45
    • 84355163843 scopus 로고    scopus 로고
    • A comparison of two approaches to safety analysis based on use cases
    • Auckland, 6-9 November, 2007 Springer LNCS 4801
    • T. Stlhane, and G. Sindre A comparison of two approaches to safety analysis based on use cases Proceedings of ER'07 Auckland, 6-9 November, 2007 2007 Springer LNCS 4801
    • (2007) Proceedings of ER'07
    • Stlhane, T.1    Sindre, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.