{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:47:22Z","timestamp":1742914042760,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319728162"},{"type":"electronic","value":"9783319728179"}],"license":[{"start":{"date-parts":[[2017,12,22]],"date-time":"2017-12-22T00:00:00Z","timestamp":1513900800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-72817-9_16","type":"book-chapter","created":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T11:44:29Z","timestamp":1513856669000},"page":"250-261","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Anti-pattern for Misuse Cases"],"prefix":"10.1007","author":[{"given":"Mohammad Torabi","family":"Dashti","sequence":"first","affiliation":[]},{"given":"Sa\u0161a","family":"Radomirovi\u0107","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,22]]},"reference":[{"key":"16_CR1","volume-title":"Writing Effective Use Cases","author":"A Cockburn","year":"2001","unstructured":"Cockburn, A.: Writing Effective Use Cases. Addison-Wesley, Boston (2001)"},{"issue":"3","key":"16_CR2","doi-asserted-by":"crossref","first-page":"53","DOI":"10.5381\/jot.2003.2.3.c6","volume":"2","author":"D Firesmith","year":"2003","unstructured":"Firesmith, D.: Security use cases. J. Object Technol. 2(3), 53\u201364 (2003)","journal-title":"J. Object Technol."},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Fratantonio, Y., Qian, C., Chung, S.P., Lee, W.: Cloak and dagger: from two permissions to complete control of the UI feedback loop. In: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22\u201326, 2017, pp. 1041\u20131057. IEEE Computer Society (2017)","DOI":"10.1109\/SP.2017.39"},{"key":"16_CR4","volume-title":"The Design and Evaluation of Physical Protection Systems","author":"ML Garcia","year":"2001","unstructured":"Garcia, M.L.: The Design and Evaluation of Physical Protection Systems. Elsevier Science, Burlington (2001)"},{"issue":"1","key":"16_CR5","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1109\/TSE.2007.70754","volume":"34","author":"C Haley","year":"2008","unstructured":"Haley, C., Laney, R., Moffett, J., Nuseibeh, B.: Security requirements engineering: a framework for representation and analysis. IEEE Trans. Softw. Eng. 34(1), 133\u2013153 (2008)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Kim, Y., Daly, R., Kim, J., Fallin, C., Lee, J.-H., Lee, D., Wilkerson, C., Lai, K., Mutlu, O.: Flipping bits in memory without accessing them: an experimental study of DRAM disturbance errors. In: ACM\/IEEE 41st International Symposium on Computer Architecture, ISCA, pp. 361\u2013372. IEEE Computer Society (2014)","DOI":"10.1145\/2678373.2665726"},{"issue":"1","key":"16_CR7","first-page":"46","volume":"8","author":"A Koenig","year":"1995","unstructured":"Koenig, A.: Patterns and antipatterns. JOOP 8(1), 46\u201348 (1995)","journal-title":"JOOP"},{"issue":"2","key":"16_CR8","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1109\/JSYST.2007.909820","volume":"1","author":"MO Lehtonen","year":"2007","unstructured":"Lehtonen, M.O., Michahelles, F., Fleisch, E.: Trust and security in RFID-based product authentication systems. IEEE Syst. J. 1(2), 129\u2013144 (2007)","journal-title":"IEEE Syst. J."},{"key":"16_CR9","unstructured":"Object Management Group: Unified modeling language (OMG UML), version 2.5 (2015)"},{"key":"16_CR10","unstructured":"OWASP: Testing guide v. 4. \nhttps:\/\/www.owasp.org\n\n. Accessed Apr 2016"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Pauli, J.J., Xu, D.: Misuse case-based design and analysis of secure software architecture. In: Proceedings of the International Conference on Information Technology: Coding and Computing, ITCC 2005, vol. 2, pp. 398\u2013403. IEEE Computer Society (2005)","DOI":"10.1109\/ITCC.2005.199"},{"issue":"6","key":"16_CR12","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/MSP.2006.149","volume":"4","author":"G Peterson","year":"2006","unstructured":"Peterson, G., Steven, J.: Defining misuse within the development process. IEEE Secur. Priv. 4(6), 81\u201384 (2006)","journal-title":"IEEE Secur. Priv."},{"issue":"6","key":"16_CR13","doi-asserted-by":"crossref","first-page":"695","DOI":"10.1108\/14637150510630864","volume":"11","author":"G Regev","year":"2005","unstructured":"Regev, G., Alexander, I.F., Wegmann, A.: Modelling the regulative role of business processes with use and misuse cases. Bus. Process Manage. J. 11(6), 695\u2013708 (2005)","journal-title":"Bus. Process Manage. J."},{"key":"16_CR14","unstructured":"Rostad, L.: An extended misuse case notation: Including vulnerabilities and the insider threat. In Working Conference on Requirements Engineering: Foundation for Software Quality (RREFSQ), pp. 33\u201334. Essener Informatik Beitrage (2006)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting security requirements by misuse cases. In: Proceedings 37th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Pacific 2000, pp. 120\u2013131 (2000)","DOI":"10.1109\/TOOLS.2000.891363"},{"issue":"1","key":"16_CR16","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G Sindre","year":"2005","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requirements Eng. 10(1), 34\u201344 (2005)","journal-title":"Requirements Eng."},{"issue":"5","key":"16_CR17","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/MSP.2005.118","volume":"3","author":"KR Wyk van","year":"2005","unstructured":"van Wyk, K.R., McGraw, G.: Bridging the gap between software development and information security. IEEE Secur. Priv. 3(5), 75\u201379 (2005)","journal-title":"IEEE Secur. Priv."},{"issue":"5","key":"16_CR18","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1145\/71633.71637","volume":"14","author":"T Vleck Van","year":"1989","unstructured":"Van Vleck, T.: Three questions about each bug you find. ACM SIGSOFT Softw. Eng. Notes 14(5), 62\u201363 (1989)","journal-title":"ACM SIGSOFT Softw. Eng. Notes"}],"container-title":["Lecture Notes in Computer Science","Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72817-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,31]],"date-time":"2018-01-31T08:56:21Z","timestamp":1517388981000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72817-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,22]]},"ISBN":["9783319728162","9783319728179"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72817-9_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017,12,22]]}}}