The Open UniversitySkip to content
 

Trust obstacle mitigation for database systems

Page, V.; Laney, R.; Dixon, M. and Haley, C. (2006). Trust obstacle mitigation for database systems. In: Bell, D. and Hong, J. eds. Flexible and Efficient Information Handling. Berlin: Springer, pp. 254–257.

DOI (Digital Object Identifier) Link: http://dx.doi.org/10.1007/11788911_24
Google Scholar: Look up in Google Scholar

Abstract

This paper introduces the Trust Obstacle Mitigation Model (TOMM), which uses the concept of trust assumptions to derive security obstacles, and the concept of misuse cases to model obstacles. The TOMM allows a development team to anticipate malicious behaviour with respect to the operational database application and to document a priori how this malicious behaviour should be mitigated.

Item Type: Book Chapter
ISBN: 3-540-35969-9, 978-3-540-35969-2
ISSN: 0302-9743
Academic Unit/Department: Mathematics, Computing and Technology > Computing & Communications
Interdisciplinary Research Centre: Centre for Research in Computing (CRC)
Item ID: 16067
Depositing User: Users 8955 not found.
Date Deposited: 12 May 2009 10:31
Last Modified: 02 Dec 2010 20:28
URI: http://oro.open.ac.uk/id/eprint/16067
Share this page:

Altmetrics

Scopus Citations

Actions (login may be required)

View Item
Report issue / request change

Policies | Disclaimer

© The Open University   + 44 (0)870 333 4340   general-enquiries@open.ac.uk