Security requirements in Software Requirements Engineering
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2012, Vol 2, Issue 5
Abstract
In the last few decades, software projects have encountered major difficulties. Most software engineering projects tend to be late and over budget. Several of the causes of these failures are related to requirements engineering issues such as requirements creep, poorly documented requirements, requirements that were impossible to satisfy, and requirements that failed to meet the needs of the user. Good requirements management practices help improve customer satisfaction, lower the system development costs, and increase the chance of having successful project which in turn give rise to security issue or vulnerable to hackers. Requirements metrics, when incorporated in requirements management, assist in analyzing the quality of requirements and identifying the reasons for software reengineering. In this paper requirements metrics define the output measures of the software process to security of the system. Some recent reports indicate that the project success rate has slightly increased over the last years. This success is a result of defining a process and use of tools like requirements management tools. There are several requirements management tools available in the market. These tools focus on information management aspects of requirements management namely traceability and organization. However, they also offer extended capabilities of collecting requirements metrics. Hence of, we likely to concentrate on the each and every phase of analysis in the life cycle of development of the software in context to security by incorporating to the requirement.
Authors and Affiliations
)P. Mahizharuvi,
Mathematical Analysis of the Control of the Spread of Infectious Disease in a Prey-Predator Ecosystem
We present a model for the mathematical analysis of the control of the spread of an infectious disease in a predator-prey ecosystem. In this work, we present a compartmental mathematical model expressed by a sy...
Improved Design of Low Power TPG Using LP-LFSR
This paper presents a novel test pattern generator which is more suitable for built in self test (BIST) structures used for testing of VLSI circuits. The purpose of the BIST is to reduce power dissipation without affecti...
Congestion Control in Wireless Sensor Network-A Survey
Wireless Sensor network is the network of sensors. The sensors are the nothing but the small devices which have the sensing ability, storage capacity and also the energy or the power storage. The function of the se...
Preprocessing and Enhancement for Mammogram Images Using Unified Approach
Breast cancer is one of the foremost causes for the increase in mortality among women, especially in developed countries. Micro-classifications in breast tissue is one of the most incident signs considered by radiologist...
Implementation and Analysis of Modified Double Precision Interval Arithmetic Array Multiplication
This paper presents the design of a 64 bit array multiplier that performs interval multiplication. This multiplier requires carry save adders instead of full adders that reduces the delay i n r e s p e c t o f co...