Journal of Software Engineering and Applications

Vol.7 No.8(2014), Paper ID 47628, 13 pages

DOI:10.4236/jsea.2014.78058

 

Refining Use/Misuse/Mitigation Use Cases for Security Requirements

 

Joshua J. Pauli

 

College of Business & Information Systems, Dakota State University, Madison, USA

 

Copyright © 2014 Joshua J. Pauli et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

 

How to Cite this Article


Pauli, J. (2014) Refining Use/Misuse/Mitigation Use Cases for Security Requirements. Journal of Software Engineering and Applications, 7, 626-638. doi: 10.4236/jsea.2014.78058.

Copyright © 2025 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.