Copy the page URI to the clipboard
Page, V.; Laney, R.; Dixon, M. and Haley, C.
(2006).
DOI: https://doi.org/10.1007/11788911_24
Abstract
This paper introduces the Trust Obstacle Mitigation Model (TOMM), which uses the concept of trust assumptions to derive security obstacles, and the concept of misuse cases to model obstacles. The TOMM allows a development team to anticipate malicious behaviour with respect to the operational database application and to document a priori how this malicious behaviour should be mitigated.