This paper describes how to model complex applications by modeling application requirements and designs separately from security requirements and designs using the UML notation. By careful separation of concerns, the security requirements are captured in security use cases and encapsulated in security objects separately from the application requirements and objects. The approach reduces system complexity caused by mixing security requirements with business application requirements with the goal of making complex systems more maintainable. Furthermore, the security use cases and objects can be reused by other software applications.
|Number of pages||10|
|State||Published - 2004|
|Event||Proceedings - Ninth IEEE International Conference on Engineering Complex Computer System: Navigating Complexity in the e-Engineering Age, ICECCS 2004 - Florence, Italy|
Duration: Apr 14 2004 → Apr 16 2004
|Conference||Proceedings - Ninth IEEE International Conference on Engineering Complex Computer System: Navigating Complexity in the e-Engineering Age, ICECCS 2004|
|Period||04/14/04 → 04/16/04|