The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May/June (2007 vol.5)
pp: 85-87
Johan Peeters , Independent Consultant
ABSTRACT
The authors discuss what abuse cases bring to software development in terms of planning. They don't assume a fixed budget is assigned to security measures but that budgetary constraints apply to the project as a whole. The authors believe it's reasonable, and often necessary, to trade functionality against security, so the question isn't how to prioritize security requirements but how to prioritize the development effort across both functional and security requirements.
INDEX TERMS
use cases, abuse cases, software development, security
CITATION
Johan Peeters, Paul Dyson, "Cost-Effective Security", IEEE Security & Privacy, vol.5, no. 3, pp. 85-87, May/June 2007, doi:10.1109/MSP.2007.56
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool