The Community for Technology Leaders
Green Image
Issue No. 03 - May/June (2007 vol. 5)
ISSN: 1540-7993
pp: 85-87
Johan Peeters , Independent Consultant
The authors discuss what abuse cases bring to software development in terms of planning. They don't assume a fixed budget is assigned to security measures but that budgetary constraints apply to the project as a whole. The authors believe it's reasonable, and often necessary, to trade functionality against security, so the question isn't how to prioritize security requirements but how to prioritize the development effort across both functional and security requirements.
use cases, abuse cases, software development, security
Johan Peeters, Paul Dyson, "Cost-Effective Security", IEEE Security & Privacy, vol. 5, no. , pp. 85-87, May/June 2007, doi:10.1109/MSP.2007.56
93 ms
(Ver 3.1 (10032016))