null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
{"ad_unit_id":"App_Resource_Sidebar_Upper","resource":{"id":709050,"author_id":358540,"title":"Security Requirements Analysis of Web\nApplications using UML","created_at":"2014-04-02T17:34:39Z","updated_at":"2016-02-19T07:13:19Z","sample":false,"description":null,"alerts_enabled":true,"cached_tag_list":null,"deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":12,"artificial_base_score":0,"recalculate_score":false,"profane":false,"hide_summary":false,"tag_list":[],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/709050","folder_id":700214,"public_author":{"id":358540,"profile":{"name":"Luis Magarreiro","about":null,"avatar_service":"gravatar","locale":"pt-PT","google_author_link":null,"user_type_id":null,"escaped_name":"Luis Magarreiro","full_name":"Luis Magarreiro","badge_classes":""}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"sequence","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
{"ad_unit_id":"App_Resource_Sidebar_Lower","resource":{"id":709050,"author_id":358540,"title":"Security Requirements Analysis of Web\nApplications using UML","created_at":"2014-04-02T17:34:39Z","updated_at":"2016-02-19T07:13:19Z","sample":false,"description":null,"alerts_enabled":true,"cached_tag_list":null,"deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":12,"artificial_base_score":0,"recalculate_score":false,"profane":false,"hide_summary":false,"tag_list":[],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/709050","folder_id":700214,"public_author":{"id":358540,"profile":{"name":"Luis Magarreiro","about":null,"avatar_service":"gravatar","locale":"pt-PT","google_author_link":null,"user_type_id":null,"escaped_name":"Luis Magarreiro","full_name":"Luis Magarreiro","badge_classes":""}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"sequence","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
709050
Security Requirements Analysis of Web Applications using UML
Description
Mind Map on Security Requirements Analysis of Web Applications using UML, created by Luis Magarreiro on 04/02/2014.
Mind Map by
Luis Magarreiro
, updated more than 1 year ago
More
Less
Created by
Luis Magarreiro
almost 9 years ago
30
0
0
{"ad_unit_id":"App_Resource_Leaderboard","width":728,"height":90,"rtype":"MindMap","rmode":"canonical","placement":1,"sizes":"[[[1200, 0], [[728, 90]]], [[0, 0], [[468, 60], [234, 60], [336, 280], [300, 250]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"placement","value":1},{"key":"sequence","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
Resource summary
Security Requirements Analysis of Web Applications using UML
1. Introduction
Attachments:
Security Requirements Analysis of Web Applications using UML - Criado a partir de um Mapa Mental
2. Security at the development process
Attachments:
2. Security at the development process
3. UMLsec Profiles
Attachments:
3 UML profiles
4. UML Security Extensions
4.1. Secure Context Model
4.2. Security Cases Model
Segurança especifica para cada utilizador com o sistema a tomar a decisão de segurança
4.3. Critical Scenarios
O cenário crítico consiste em descrever e representar os problemas usando vários serviços de segurança.
Na troca de informação, será necessário algumas restrições para aceder a certa informação. ( Segredo, Integridade e Identidade).
Este representa sequência particular (interacções entre utilizadores e o sistema) que envolve um risco em termos de segurança do computador.
Annotations:
imagem pdf
4.5. Data Security
4.6. Protected Hardware Configuration
4.4. Secure Interactions of Objects
5. Conclusion
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Memory Key words
Sammy :P
Fractions and percentages
Bob Read
GCSE Biology 4 OCR - The Processes of Life
blairzy123
TYPES OF DATA
Elliot O'Leary
Maths GCSE - What to revise!
livvy_hurrell
History- Medicine through time key figures
gemma.bell
4 Lesson Planning Tips for Teachers
Micheal Heffernan
Frankenstein - Mary Shelley
Johnny Hammer
el centro comercial
Pamela Dentler
7 Elements of Good Design
Micheal Heffernan
1PR101 2.test - Část 18.
Nikola Truong
Browse Library
{"ad_unit_id":"App_Resource_Leaderboard","width":728,"height":90,"rtype":"MindMap","rmode":"canonical","placement":2,"sizes":"[[[0, 0], [[970, 250], [970, 90], [728, 90]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"placement","value":2},{"key":"sequence","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}