Page, V.; Laney, R.; Dixon, M. and Haley, C.
(2006). Trust obstacle mitigation for database systems.
In: Bell, D. and Hong, J. eds.
Flexible and Efficient Information Handling.
Berlin: Springer, pp. 254–257.
This paper introduces the Trust Obstacle Mitigation Model (TOMM), which uses the concept of trust assumptions to derive security obstacles, and the concept of misuse cases to model obstacles. The TOMM allows a development team to anticipate malicious behaviour with respect to the operational database application and to document a priori how this malicious behaviour should be mitigated.
Actions (login may be required)