Eliciting usable security requirements with misusability cases

Authors: Faily, S. and Fléchais, I.

Journal: Proceedings of the 2011 IEEE 19th International Requirements Engineering Conference, RE 2011

Pages: 339-340

ISBN: 9781457709234

DOI: 10.1109/RE.2011.6051665

Abstract:

Although widely used for both security and usability concerns, scenarios used in security design may not necessarily inform the design of usability, and vice-versa. One way of using scenarios to bridge security and usability involves explicitly describing how design decisions can lead to users inadvertently exploiting vulnerabilities to carry out their production tasks. We present Mis-usability Cases: scenarios which describe how design decisions may lead to usability problems subsequently leading to system misuse. We describe the steps carried out to develop and apply misusability cases to elicit requirements and report preliminary results applying this technique in a recent case study. © 2011 IEEE.

Source: Scopus

Eliciting Usable Security Requirements with Misusability Cases

Authors: Faily, S. and Flechais, I.

Journal: 2011 19TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE)

Pages: 339-340

ISSN: 1090-705X

Source: Web of Science (Lite)

Eliciting Usable Security Requirements with Misusability Cases

Authors: Faily, S. and Flechais, I.

Journal: Proceedings of the 19th IEEE International Requirements Engineering Conference

Pages: 339-340

Publisher: IEEE Computer Society

Source: Manual

Eliciting usable security requirements with misusability cases.

Authors: Faily, S. and Flechais, I.

Journal: RE

Pages: 339-340

Publisher: IEEE Computer Society

ISBN: 978-1-4577-0921-0

DOI: 10.1109/RE.2011.6051665

https://ieeexplore.ieee.org/xpl/conhome/6036256/proceeding

Source: DBLP