Vis enkel innførsel

dc.contributor.advisorSindre, Guttormnb_NO
dc.contributor.authorPan, Yushannb_NO
dc.date.accessioned2014-12-19T13:39:03Z
dc.date.available2014-12-19T13:39:03Z
dc.date.created2012-11-08nb_NO
dc.date.issued2012nb_NO
dc.identifier566243nb_NO
dc.identifierntnudaim:5883nb_NO
dc.identifier.urihttp://hdl.handle.net/11250/252975
dc.description.abstractIn the course TDT4501 - Specialization Project - ReqSec project , the preparatory course to this thesis, through purely analytical evaluation of the eight modeling approaches, the advantages and disadvantages were illustrated based on the categories - i*-based modeling approach and Use Case-based modeling approach.However, only a purely analytical evaluation of the modeling approaches does not alwaysreflect their practical usefulness. Hence, the [motivation] of the thesis was selecting two modeling approaches, those are Secure Tropos and Misuse Cases, using an empirical investigation for such evaluations to guide the researchers and practitioners a better overview and understanding of the benefits of the two modeling approaches in a real life usage. The objective was to see if the advantages claimed analytically in the previous project also come true in practice. [Questions] Through a controlled experiment, two core problems shall be investigated: a) How about the participants performance when they applied the two modeling approaches to finish tasks in the experiment and b) Their preference for the two modeling approaches after the experiment. The [principle] was using two modeling approaches to perform the experiment, through the participants performance on the identified number of threats and mitigations for the experiment cases, and their perception of the two modeling approaches by means of asking them to estimate the usage of modeling diagrams, textual description of cases, and memory in the experiment. And combining with the evaluation of post-questionnaire analysis, the conclusions were summarized based on the empirical study of statistical results and the previous analytical study results, to investigate whether the empirical evaluation could match well with analytical evaluation or not.[Contribution] The experiment project was the first time to compare the Secure Troposand Misuse Cases comprehensibly. The results illustrated that both modeling techniqueshad no significant difference of identifying threats but they had significant difference of identifying mitigations in this controlled experiment with 50 students who apply to both modeling approaches with relevant cases. And through analyzing the same case with the same modeling approach or different modeling approach of the experiment, it was found that Net Shopping case was identified more mitigations and threats by the participants when considering the aspect of technique criteria of threats and mitigations. The participants were complementary regarding goal-based modeling approach in some security issues and performed non-techniques threats and mitigations in this controlled experiment. Hence, Secure Tropos was investigated perceiving more favorable. In the last, comparing with the six dimensions from previous analytical comparison, the investigation shows that most of the two modeling approaches advantages were confirmed, and the results also coincided to the previous analytical evaluation.Keywords: Secure Tropos, Misuse Case, Empirical Study, Security Modelingnb_NO
dc.languageengnb_NO
dc.publisherInstitutt for datateknikk og informasjonsvitenskapnb_NO
dc.subjectntnudaim:5883no_NO
dc.subjectMSINFOSYST Master in Information Systemsno_NO
dc.subjectInformation Systems Engineeringno_NO
dc.titleComparison of i*-based and Use Case-based Security Modelling Initiatives for Software Requirements Engineering: An empirical comparison of Secure Tropos and Misuse Casesnb_NO
dc.typeMaster thesisnb_NO
dc.source.pagenumber164nb_NO
dc.contributor.departmentNorges teknisk-naturvitenskapelige universitet, Fakultet for informasjonsteknologi, matematikk og elektroteknikk, Institutt for datateknikk og informasjonsvitenskapnb_NO


Tilhørende fil(er)

Thumbnail
Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel