Security requirements in Software Requirements Engineering
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2012, Vol 2, Issue 5
Abstract
In the last few decades, software projects have encountered major difficulties. Most software engineering projects tend to be late and over budget. Several of the causes of these failures are related to requirements engineering issues such as requirements creep, poorly documented requirements, requirements that were impossible to satisfy, and requirements that failed to meet the needs of the user. Good requirements management practices help improve customer satisfaction, lower the system development costs, and increase the chance of having successful project which in turn give rise to security issue or vulnerable to hackers. Requirements metrics, when incorporated in requirements management, assist in analyzing the quality of requirements and identifying the reasons for software reengineering. In this paper requirements metrics define the output measures of the software process to security of the system. Some recent reports indicate that the project success rate has slightly increased over the last years. This success is a result of defining a process and use of tools like requirements management tools. There are several requirements management tools available in the market. These tools focus on information management aspects of requirements management namely traceability and organization. However, they also offer extended capabilities of collecting requirements metrics. Hence of, we likely to concentrate on the each and every phase of analysis in the life cycle of development of the software in context to security by incorporating to the requirement.
Authors and Affiliations
)P. Mahizharuvi,
Implication of Cell Phone Usage on Study Patterns of Teens
Cell phone usage has become worldwide commodity for every person regardless of their ages. Over the years, teenagers within the age bracket of thirteen to nineteen are more vulnerable towards the use of the technology in...
Data Mining as a Tool to Predict Churn Behavior of Customers
Customer is the heart and soul of any organization. The era of globalization and cut throat competition has changed the basic concept of marketing, now marketing is not confined to selling the products to the custo...
Table Detection and Extraction from Image Document
Tables make information easier to understand and perceive than regular text block. Now days, it becomes popular structure for information representation. Format of tables differs and change according to need of rep...
A Novel Approach of a n effective image retrieval scheme using color, texture and shape features
In this paper, we present a new and effective color image retrieval scheme for combining all the three i.e. color, texture and shape information, which achieved higher retrieval efficiency. Firstly, the image is predeter...
Effective Searching Shortest Path In Graph Using Prim’s Algorithm
Prims algorithm is studied the shortest path problem in the greedy method which is used to select a subset of the edge such that spanning tree is formed and the weight of the edges is minimal. There are various shortest...