Enhancing Misuse Cases With Risk Assessment for Safety Requirements

dc.authoridFernandez-Sanz, Luis/0000-0003-0778-0073
dc.authoridMisra, Sanjay/0000-0002-3556-9331
dc.authoridAbayomi-Alli, Olusola/0000-0003-2513-5318
dc.authoridArogundade, Oluwasefunmi/0000-0001-9338-491X
dc.authorscopusid36805695100
dc.authorscopusid56962766700
dc.authorscopusid56811478400
dc.authorscopusid25630384100
dc.authorwosidAbayomi-Alli, Olusola Oluwakemi/ABC-2838-2021
dc.authorwosidFernandez, Luis/KHX-5442-2024
dc.authorwosidFernandez-Sanz, Luis/J-4895-2012
dc.authorwosidMisra, Sanjay/K-2203-2014
dc.contributor.authorMısra, Sanjay
dc.contributor.authorMisra, Sanjay
dc.contributor.authorAbayomi-Alli, Olusola O.
dc.contributor.authorFernandez-Sanz, Luis
dc.contributor.otherComputer Engineering
dc.date.accessioned2024-07-05T15:41:43Z
dc.date.available2024-07-05T15:41:43Z
dc.date.issued2020
dc.departmentAtılım Universityen_US
dc.department-temp[Arogundade, Oluwasefunmi T.] Fed Univ Agr, Dept Comp Sci, Abeokuta 110124, Nigeria; [Misra, Sanjay] Atilim Univ, Dept Comp Engn, TR-06830 Ankara, Turkey; [Misra, Sanjay; Abayomi-Alli, Olusola O.] Covenant Univ, Dept Elect & Informat Engn, Ota 112233, Nigeria; [Fernandez-Sanz, Luis] Univ Alcala, Dept Comp Sci, Madrid 28801, Spainen_US
dc.descriptionFernandez-Sanz, Luis/0000-0003-0778-0073; Misra, Sanjay/0000-0002-3556-9331; Abayomi-Alli, Olusola/0000-0003-2513-5318; Arogundade, Oluwasefunmi/0000-0001-9338-491Xen_US
dc.description.abstractRisk-driven requirements elicitation represents an approach that allows assignment of appropriate countermeasure for the protection of the Information System (IS) depending on the risk level. Elicitation of safety requirements based on risk analysis is essential for those IS which will run on the open and dynamic Internet platform. Traditionally, misuse cases are used to find the weak points of an IS but cannot differentiate between the weak point that can lead to lenient hazard and/or serious hazard. In this paper, we present an enhanced misuse case approach to support IS safety risk assessment at the early stages of software process. We extensively examined and identified concepts which constitute a modelling technique for IS safety risk assessment and build a conceptual model for achieving IS safety risk assessment during the requirement analysis phase of software process. The risk assessment process follows an approach of consequential analysis based on misuse cases for safety hazard identification and qualitative risk measurement. The safety requirements are elicited according to the results of the risk assessment. A medical IS is used as a case study to validate the proposed model.en_US
dc.description.sponsorshipSwedish International Development Cooperation Agency (Sida); Organization for Women in Science in Developing World (OWSD); U.S. Department of Commerce [BS123456]en_US
dc.description.sponsorshipThis work was supported in part by the Swedish International Development Cooperation Agency (Sida), in part by the Organization for Women in Science in Developing World (OWSD), and in part by the U.S. Department of Commerce under Grant BS123456.en_US
dc.identifier.citation3
dc.identifier.doi10.1109/ACCESS.2019.2963673
dc.identifier.endpage12014en_US
dc.identifier.issn2169-3536
dc.identifier.scopus2-s2.0-85078694658
dc.identifier.scopusqualityQ1
dc.identifier.startpage12001en_US
dc.identifier.urihttps://doi.org/10.1109/ACCESS.2019.2963673
dc.identifier.urihttps://hdl.handle.net/20.500.14411/3486
dc.identifier.volume8en_US
dc.identifier.wosWOS:000525409100014
dc.identifier.wosqualityQ2
dc.language.isoenen_US
dc.publisherIeee-inst Electrical Electronics Engineers incen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectMisuse caseen_US
dc.subjectrequirements engineeringen_US
dc.subjectrisk assessmenten_US
dc.subjectscenarioen_US
dc.subjectsafetyen_US
dc.subjectuse casesen_US
dc.titleEnhancing Misuse Cases With Risk Assessment for Safety Requirementsen_US
dc.typeArticleen_US
dspace.entity.typePublication
relation.isAuthorOfPublication53e88841-fdb7-484f-9e08-efa4e6d1a090
relation.isAuthorOfPublication.latestForDiscovery53e88841-fdb7-484f-9e08-efa4e6d1a090
relation.isOrgUnitOfPublicatione0809e2c-77a7-4f04-9cb0-4bccec9395fa
relation.isOrgUnitOfPublication.latestForDiscoverye0809e2c-77a7-4f04-9cb0-4bccec9395fa

Files

Collections