Show simple item record

dc.contributor.authorKarpati, Peter
dc.contributor.authorOpdahl, Andreas Lothe
dc.contributor.authorSindre, Guttorm
dc.date.accessioned2024-04-23T09:05:02Z
dc.date.available2024-04-23T09:05:02Z
dc.date.created2015-02-17T12:12:38Z
dc.date.issued2015
dc.identifier.citationJournal of Systems and Software. 2015, 104 90-111.en_US
dc.identifier.issn0164-1212
dc.identifier.urihttps://hdl.handle.net/11250/3127742
dc.description.abstractMany techniques have been proposed for eliciting software security requirements during the early requirements engineering phase. However, few techniques so far provide dedicated views of security issues in a software systems architecture context. This is a problem, because almost all requirements work today happens in a given architectural context, and understanding this architecture is vital for identifying security vulnerabilities and corresponding mitigations. Misuse case maps attempt to provide an integrated view of security and architecture by augmenting use case maps with misuse case concepts. This paper evaluates misuse case maps through two controlled experiments where 33 and 54 ICT students worked on complex real-life intrusions described in the literature. The students who used misuse case maps showed significantly better understanding of intrusions and better ability to suggest mitigations than students who used a combination of two existing techniques as an alternative treatment. Misuse case maps were also perceived more favourably overall than the alternative treatment, and participants reported using misuse case maps more when solving their tasks.en_US
dc.description.abstractInvestigating security threats in architectural context: Experimental evaluations of misuse case mapsen_US
dc.language.isoengen_US
dc.publisherElsevieren_US
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/deed.no*
dc.titleInvestigating security threats in architectural context: Experimental evaluations of misuse case mapsen_US
dc.title.alternativeInvestigating security threats in architectural context: Experimental evaluations of misuse case mapsen_US
dc.typeJournal articleen_US
dc.typePeer revieweden_US
dc.description.versionacceptedVersionen_US
dc.rights.holder© 2015. This manuscript version is made available under the CC-BY-NC-ND 4.0 license https://creativecommons.org/licenses/by-nc-nd/4.0/(opens in new tab/window)en_US
dc.subject.nsiVDP::Informasjons- og kommunikasjonssystemer: 321en_US
dc.subject.nsiVDP::Information and communication systems: 321en_US
dc.source.pagenumber90-111en_US
dc.source.volume104en_US
dc.source.journalJournal of Systems and Softwareen_US
dc.identifier.doi10.1016/j.jss.2015.02.040
dc.identifier.cristin1222944
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode2


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal
Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal