J McDermott, C Fox - … 15th Annual Computer Security …, 1999 - ieeexplore.ieee.org
… the abuse case model one step behind the use case model. We use each component of the
use case model to construct the … various kinds of protection, in mathematically sound ways. …