The Open UniversitySkip to content

Trust obstacle mitigation for database systems

Page, V.; Laney, R.; Dixon, M. and Haley, C. (2006). Trust obstacle mitigation for database systems. In: Bell, D. and Hong, J. eds. Flexible and Efficient Information Handling. Berlin: Springer, pp. 254–257.

DOI (Digital Object Identifier) Link:
Google Scholar: Look up in Google Scholar


This paper introduces the Trust Obstacle Mitigation Model (TOMM), which uses the concept of trust assumptions to derive security obstacles, and the concept of misuse cases to model obstacles. The TOMM allows a development team to anticipate malicious behaviour with respect to the operational database application and to document a priori how this malicious behaviour should be mitigated.

Item Type: Book Section
ISBN: 3-540-35969-9, 978-3-540-35969-2
ISSN: 0302-9743
Academic Unit/School: Faculty of Science, Technology, Engineering and Mathematics (STEM) > Computing and Communications
Faculty of Science, Technology, Engineering and Mathematics (STEM)
Interdisciplinary Research Centre: Centre for Research in Computing (CRC)
Item ID: 16067
Depositing User: Users 8955 not found.
Date Deposited: 12 May 2009 10:31
Last Modified: 04 Oct 2016 10:22
Share this page:


Scopus Citations

▼ Automated document suggestions from open access sources

Actions (login may be required)

Policies | Disclaimer

© The Open University   + 44 (0)870 333 4340