Alignment of Misuse Cases to ISSRM

نویسندگان

  • Inam Soomro
  • Marlon Dumas
چکیده

..........................................................................................................2 Acknowledgement ............................................................................................................................... 3 List of Figures ..................................................................................................................................... 7 List of Tables ....................................................................................................................................... 8 Abbreviation and Acronyms ............................................................................................................... 9

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management Based on TOGAF

Technology Organisation (RTO) that develops advanced technologies and delivers innovative products and services to industry and society. As a major engine of the diversification and growth of Luxembourg's economy through innovation, LIST supports the deployment of a number of solutions to a wide range of sectors, including energy, IT, telecommunications, environment, agriculture, and advanced m...

متن کامل

A Model Transformation from Misuse Cases to Secure Tropos

In current practices security concerns are typically addressed at the design or implementation stages, leaving aside the rationale for security analysis. The reason is that a systematic approach to address security from late development stages to early analysis stages does not exist. This paper presents transformation rules to perform model translation from misuse case diagram to Secure Tropos ...

متن کامل

An Extension of Business Process Model and Notation for Security Risk Management

Business process modelling is one of the major aspects in the modern information system development. Recently business process model and notation (BPMN) has become a standard technique to support this activity. Typically the BPMN notations are used to understand enterprise’s business processes. However, limited work exists regarding how security concerns are addressed during the management of t...

متن کامل

A Comparison of Security Modelling Languages used for Security Risk Management

Nowadays, every company that has valuable assets has an urge to protect them. Unfortunately, it is impossible to act on every single security threat. To mitigate these threats Security Modelling Languages were extended to use for Security Risk Management. However, choosing suitable language can be a difficult decision, because it can be a problem to compare those languages and decide which one ...

متن کامل

Developing a Model for theAlignment of Strategies of HRM with Macro-level Strageies in National Iranian Oil Company

The purpose of this study was to develop a model of alignment of HR strategies with macro-level strategies. The population of the research were directors and human resources experts of the National Iranian Oil Company and its subsidiaries. The sample needed for qualitative interviews to the extent of theoretical saturation and collected through a targeted judgment sampling of 14 people. Data an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012