Eliciting usable security requirements with misusability cases
Authors: Faily, S. and Fléchais, I.
Journal: Proceedings of the 2011 IEEE 19th International Requirements Engineering Conference, RE 2011
Pages: 339-340
ISBN: 9781457709234
DOI: 10.1109/RE.2011.6051665
Abstract:Although widely used for both security and usability concerns, scenarios used in security design may not necessarily inform the design of usability, and vice-versa. One way of using scenarios to bridge security and usability involves explicitly describing how design decisions can lead to users inadvertently exploiting vulnerabilities to carry out their production tasks. We present Mis-usability Cases: scenarios which describe how design decisions may lead to usability problems subsequently leading to system misuse. We describe the steps carried out to develop and apply misusability cases to elicit requirements and report preliminary results applying this technique in a recent case study. © 2011 IEEE.
Source: Scopus
Eliciting Usable Security Requirements with Misusability Cases
Authors: Faily, S. and Flechais, I.
Journal: 2011 19TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE)
Pages: 339-340
ISSN: 1090-705X
Source: Web of Science (Lite)
Eliciting Usable Security Requirements with Misusability Cases
Authors: Faily, S. and Flechais, I.
Journal: Proceedings of the 19th IEEE International Requirements Engineering Conference
Pages: 339-340
Publisher: IEEE Computer Society
Source: Manual
Eliciting usable security requirements with misusability cases.
Authors: Faily, S. and Flechais, I.
Journal: RE
Pages: 339-340
Publisher: IEEE Computer Society
ISBN: 978-1-4577-0921-0
DOI: 10.1109/RE.2011.6051665
https://ieeexplore.ieee.org/xpl/conhome/6036256/proceeding
Source: DBLP