The Open UniversitySkip to content

Trust obstacle mitigation for database systems

Page, V.; Laney, R.; Dixon, M. and Haley, C. (2006). Trust obstacle mitigation for database systems. In: Bell, D. and Hong, J. eds. Flexible and Efficient Information Handling. Berlin: Springer, pp. 254–257.

DOI (Digital Object Identifier) Link:
Google Scholar: Look up in Google Scholar


This paper introduces the Trust Obstacle Mitigation Model (TOMM), which uses the concept of trust assumptions to derive security obstacles, and the concept of misuse cases to model obstacles. The TOMM allows a development team to anticipate malicious behaviour with respect to the operational database application and to document a priori how this malicious behaviour should be mitigated.

Item Type: Book Chapter
ISBN: 3-540-35969-9, 978-3-540-35969-2
ISSN: 0302-9743
Academic Unit/Department: Mathematics, Computing and Technology > Computing & Communications
Interdisciplinary Research Centre: Centre for Research in Computing (CRC)
Item ID: 16067
Depositing User: Users 8955 not found.
Date Deposited: 12 May 2009 10:31
Last Modified: 02 Dec 2010 20:28
Share this page:


Scopus Citations

Actions (login may be required)

Policies | Disclaimer

© The Open University   + 44 (0)870 333 4340