Search
Close this search box.

Authors: Arogundade, O.T.; Akinwale, A.T.; Jin, Z.; Yang, X.G.
International Journal of software Engineering and its Applications Vol.5 No.4, 2011

Abstract
Abuse case has great support in identifying security threats and security requirements caused by outside attackers, but it has not been used to capture non-malicious deliberate acts for safety concerns that involves inside abusers. It is important to represent inside abusers in a model and distinguish them from inside intruders and outside attackers, since their behaviors are different. The intent of this paper is to propose a new extension of abuse case to identify deliberate acts of safety threats caused by inside abusers.

Download PDF

Times Higher Education (THE)
World University Rankings (WUR) for 2024

rANKING OF UniversitIES of Agriculture

1ST IN aFRICA | 7TH gLOBALLY

30th Convocation Ceremonies

Award of First Degree to deserving graduands

Days
Hours
Minutes
Seconds