Abstract

The global use of UML diagrams serving as a baseline for the development of software leads to the mandatory consideration of non-functional requirements providing a secure and robust application. Secure SRS model with CIA-AAA provides the consideration of non-functional requirements and quality attributes before authorizing the users for accessing use cases. The extensive literature survey for UML Use case diagram is done. The UML use case diagrams do not provide notations, stereotypes, constraint for mis-use case and defense mechanism. This paper describes various notations, the new stereotypes such as Authentication, Buffer Overflow, SQL Injection, Encryption, Session Expiration and Connection Flooding with mathematical modelling for mitigating the attacks on the various transactions or use cases handle by the actors for providing the security.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call