2014-01-23から1日間の記事一覧

Eliciting security requirements with misuse cases

Another possibility is to align misuse cases with traditional fault-tree analysis methods from the safety area, such as threat trees [49] or attack trees [50, 51]. Adapted for security analysis, these trees would decompose security threats…