Security requirements in Software Requirements Engineering
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2012, Vol 2, Issue 5
Abstract
In the last few decades, software projects have encountered major difficulties. Most software engineering projects tend to be late and over budget. Several of the causes of these failures are related to requirements engineering issues such as requirements creep, poorly documented requirements, requirements that were impossible to satisfy, and requirements that failed to meet the needs of the user. Good requirements management practices help improve customer satisfaction, lower the system development costs, and increase the chance of having successful project which in turn give rise to security issue or vulnerable to hackers. Requirements metrics, when incorporated in requirements management, assist in analyzing the quality of requirements and identifying the reasons for software reengineering. In this paper requirements metrics define the output measures of the software process to security of the system. Some recent reports indicate that the project success rate has slightly increased over the last years. This success is a result of defining a process and use of tools like requirements management tools. There are several requirements management tools available in the market. These tools focus on information management aspects of requirements management namely traceability and organization. However, they also offer extended capabilities of collecting requirements metrics. Hence of, we likely to concentrate on the each and every phase of analysis in the life cycle of development of the software in context to security by incorporating to the requirement.
Authors and Affiliations
)P. Mahizharuvi,
IRIS AUTHENTICATION USING PSO
The paper proposes a wavelet probabilistic neural network (WPNN) for iris biometric classifier. The WPNN combines wavelet neural network and probabilistic neural network for a new classifier model which will be...
A Survey On Report Based Secure Payment Scheme For Multihop Wireless Networks
Multihop wireless networks (MWNs) composed of two end nodes is carried out through a number of intermediate nodes whose function is to relay information from one point to another, without using any kind of fixed wired in...
Translation of Bengali Terms in Mobile Phones: a Simplified Approach Based on the Prescriptions of Conventional Accent Understand Ability
— Technology is the making, usage and knowledge of tools, techniques, crafts, systems or methods of organization in order to solve a problem or serve some purpose. This is true for humanitarian issues also. Such as...
LFSR Based Watermark and Address Generator for Digital Image Watermarking SRAM
In digital image watermarking authentication methods and techniques, the original image will be watermarked with a text, image, audio or any signature. To overcome the uneven and enormous distribution of multi...
An Efficient Algorithm to Obtain the Optimal Solution for Fuzzy Transportation Problems
In this paper we solve the Fuzzy Transportation problems by using a new algorithm namely EAVAM . We introduce an approach for solving a wide range of such problems by using a method which applies it for ranking of the fu...