Skip to main navigation Skip to search Skip to main content

The role of sequence diagrams in use/misuse case decomposition for secure systems

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Misuse case modeling is a viable option to depict the security requirements together with functional requirements. We use decomposition to investigate the interplay between functional and security requirements, thus creating a complete set of security-centric requirements. Part of the initial decomposition is to identify relationships ("includes" and "extends") among decomposed cases for each case type (use, misuse, mitigation use). Decomposition is conducted for each case type independently and then integrated with the "threatens" and "mitigates" relationships where misuse cases "threaten" use cases and mitigation use cases "mitigate" misuse cases. We use sequence diagrams as an additional tool to show the behaviors of normal usage (use cases), potential threats (misuse cases), and necessary security measures (mitigation use cases). These diagrams are especially useful because the order of execution for each case type can have a direct impact on the security of the system. We create a sequence diagram for each case type to aid in the comprehension. As part of this creation, we developed a process for identifying the elements of each diagram and how to ensure that the elements and messages in the sequence diagram are consistent with what was first documented in the textual description of each case.

Original languageEnglish (US)
Title of host publicationProceedings of the 10th IASTED International Conference on Software Engineering and Applications, SEA 2006
Pages153-158
Number of pages6
StatePublished - 2006
Externally publishedYes
Event10th IASTED International Conference on Software Engineering and Applications, SEA 2006 - Dallas, TX, United States
Duration: Nov 13 2006Nov 15 2006

Publication series

NameProceedings of the 10th IASTED International Conference on Software Engineering and Applications, SEA 2006

Conference

Conference10th IASTED International Conference on Software Engineering and Applications, SEA 2006
Country/TerritoryUnited States
CityDallas, TX
Period11/13/0611/15/06

Keywords

  • Consistency
  • Decomposition
  • Security requirements
  • Sequence diagrams
  • Use/misuse cases

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'The role of sequence diagrams in use/misuse case decomposition for secure systems'. Together they form a unique fingerprint.

Cite this