Security requirements in Software Requirements Engineering

Abstract

 In the last few decades, software projects have encountered major difficulties. Most software engineering projects tend to be late and over budget. Several of the causes of these failures are related to requirements engineering issues such as requirements creep, poorly documented requirements, requirements that were impossible to satisfy, and requirements that failed to meet the needs of the user. Good requirements management practices help improve customer satisfaction, lower the system development costs, and increase the chance of having successful project which in turn give rise to security issue or vulnerable to hackers. Requirements metrics, when incorporated in requirements management, assist in analyzing the quality of requirements and identifying the reasons for software reengineering. In this paper requirements metrics define the output measures of the software process to security of the system. Some recent reports indicate that the project success rate has slightly increased over the last years. This success is a result of defining a process and use of tools like requirements management tools. There are several requirements management tools available in the market. These tools focus on information management aspects of requirements management namely traceability and organization. However, they also offer extended capabilities of collecting requirements metrics. Hence of, we likely to concentrate on the each and every phase of analysis in the life cycle of development of the software in context to security by incorporating to the requirement.

Authors and Affiliations

)P. Mahizharuvi,

Keywords

Related Articles

 Mathematical Analysis of the Control of the Spread of Infectious Disease in a Prey-Predator Ecosystem

 We present a model for the mathematical analysis of the control of the spread of an infectious disease in a predator-prey ecosystem. In this work, we present a compartmental mathematical model expressed by a sy...

Improved Design of Low Power TPG Using LP-LFSR

This paper presents a novel test pattern generator which is more suitable for built in self test (BIST) structures used for testing of VLSI circuits. The purpose of the BIST is to reduce power dissipation without affecti...

 Congestion Control in Wireless Sensor Network-A  Survey

 Wireless Sensor network is the network of sensors. The sensors are the nothing but the small devices which have the sensing ability, storage capacity and also the energy or the power storage. The function of the se...

Preprocessing and Enhancement for Mammogram Images Using Unified Approach

Breast cancer is one of the foremost causes for the increase in mortality among women, especially in developed countries. Micro-classifications in breast tissue is one of the most incident signs considered by radiologist...

 Implementation and Analysis of Modified Double Precision Interval Arithmetic Array Multiplication

 This paper presents the design of a 64 bit array multiplier that performs interval multiplication. This multiplier requires carry save adders instead of full adders that reduces the delay i n r e s p e c t o f co...

Download PDF file
  • EP ID EP130554
  • DOI -
  • Views 74
  • Downloads 0

How To Cite

)P. Mahizharuvi, (2012).  Security requirements in Software Requirements Engineering. International Journal of Computer & organization Trends(IJCOT), 2(5), 128-134. https://europub.co.uk/articles/-A-130554