REQUIREMENT ENGINEERING PARADIGM
Keywords:
Security Requirement (SR), requirement elicitation, requirement analysis, requirement prioritization, requirement management.Abstract
Requirement Engineering is an important phase of any software development. The requirements should be unambiguous (measurable and testable), traceable, consistent, and approved. Now-a-days the importance of security is growing with the rise of phenomena such as e-commerce and nomadic and geographically distributed work. Therefore, it becomes necessary to apply requirement engineering practices in every phase of software development. Requirements engineering for software development process is a complex exercise that considers product demands from several viewpoints, roles, responsibilities, and objectives. In this paper, we propose an effective requirement engineering process model to generate appropriate, accurate, consistent requirementsReferences
REFFERENCES
Dhirendra Pandey, UgrasenSuman& A. K. Ramani, “Security Requirement Engineering Issues In Risk Management”, International Journal Of Computer Applications, Foundation Of Computer Science, USA, ISBN: 978-93-80747-89-4, Vol. 17, No. 5, Pp.11-14, 2011.
Roger S. Pressman (Fifth Edition), Software Engineering-A Practitioner’s Approach, McGraw Hill,p.20- 24.
Dhirendra Pandey, “International Journal of Computational Intelligence And Information Security”, IJCIIS, Australia, Vol. 1 No. 8, Issn: 1837-7823.
Donald G. Firesmith, (2003) “Engineering Security Requirements”, Journal of object technology, vol 2, no.1, pp.53-68.
Dhirendra Pandey, UgrasenSuman and A. K. Ramani, “Security Requirement Engineering Framework for Developing Secure Software”, International Journal of Computational Intelligence and Information Security, IJCIIS Australia, Vol. 1 No. 8, Issn: 1837-7823, Pp.55-65, 2010.
Agarwal A, Gupta D, (2008) “Security Requirement Elicitation Using View Points for online
System”, IEEE Computer Society.
Kotonya G. and Sommerville I.: Requirements Engineering: Processes and Techniques. John Wiley & Sons, 1998.
Alexander I.: Misuse Cases Help to Elicit Non- Functional Requirements, Position paper for Policy Workshop 1999, Bristol, U.K., and November 1999
Downloads
Published
Issue
Section
License
Copyright Notice
Submission of an article implies that the work described has not been published previously (except in the form of an abstract or as part of a published lecture or academic thesis), that it is not under consideration for publication elsewhere, that its publication is approved by all authors and tacitly or explicitly by the responsible authorities where the work was carried out, and that, if accepted, will not be published elsewhere in the same form, in English or in any other language, without the written consent of the Publisher. The Editors reserve the right to edit or otherwise alter all contributions, but authors will receive proofs for approval before publication.
Copyrights for articles published in World Scholars journals are retained by the authors, with first publication rights granted to the journal. The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.