Shamal Faily
Eliciting usable security requirements with misusability cases.
Faily, Shamal; Fl�chais, Ivan
Authors
Ivan Fl�chais
Abstract
Although widely used for both security and usability concerns, scenarios used in security design may not necessarily inform the design of usability, and vice-versa. One way of using scenarios to bridge security and usability involves explicitly describing how design decisions can lead to users inadvertently exploiting vulnerabilities to carry out their production tasks. We present Mis-usability Cases: scenarios which describe how design decisions may lead to usability problems subsequently leading to system misuse. We describe the steps carried out to develop and apply misusability cases to elicit requirements and report preliminary results applying this technique in a recent case study.
Citation
FAILY, S. and FLÉCHAIS, I. 2011. Eliciting usable security requirements with misusability cases. Presented at the 19th IEEE international requirements engineering conference (RE 2011), 29 August - 2 September 2011, Trento, Italy.
Presentation Conference Type | Poster |
---|---|
Conference Name | 19th IEEE international requirements engineering conference (RE 2011) |
Conference Location | Trento, Italy |
Start Date | Aug 29, 2011 |
End Date | Sep 2, 2011 |
Deposit Date | Dec 6, 2021 |
Publicly Available Date | Dec 6, 2021 |
DOI | https://doi.org/10.1109/re.2011.6051665 |
Keywords | Systems security; User-centred design; Software engineering; Requirements engineering |
Public URL | https://rgu-repository.worktribe.com/output/1427849 |
Additional Information | The extended abstract for this poster has been published with the following citation: FAILY, S. and FLÉCHAIS, I. 2011. Eliciting usable security requirements with misusability cases. In Proceedings of the 19th IEEE international requirements engineering conference (RE 2011), 29 August - 2 September 2011, Trento, Italy. Piscataway: IEEE [online], pages 339-340. Available from: https://doi.org/10.1109/re.2011.6051665 |
Files
FAILY 2011 Eliciting usable security requirements (POSTER)
(661 Kb)
PDF
You might also like
Programming language evaluation criteria for safety-critical software in the air domain.
(2022)
Conference Proceeding
Privacy goals for the data lifecycle.
(2022)
Journal Article
Automation and cyber security risks on the railways: the human factors implications.
(2022)
Presentation / Conference
Assessing system of systems information security risk with OASoSIS.
(2022)
Journal Article
Integrated design framework for facilitating systems-theoretic process analysis.
(2022)
Conference Proceeding
Downloadable Citations
About OpenAIR@RGU
Administrator e-mail: publications@rgu.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search