Security requirements in Software Requirements Engineering

Abstract

 In the last few decades, software projects have encountered major difficulties. Most software engineering projects tend to be late and over budget. Several of the causes of these failures are related to requirements engineering issues such as requirements creep, poorly documented requirements, requirements that were impossible to satisfy, and requirements that failed to meet the needs of the user. Good requirements management practices help improve customer satisfaction, lower the system development costs, and increase the chance of having successful project which in turn give rise to security issue or vulnerable to hackers. Requirements metrics, when incorporated in requirements management, assist in analyzing the quality of requirements and identifying the reasons for software reengineering. In this paper requirements metrics define the output measures of the software process to security of the system. Some recent reports indicate that the project success rate has slightly increased over the last years. This success is a result of defining a process and use of tools like requirements management tools. There are several requirements management tools available in the market. These tools focus on information management aspects of requirements management namely traceability and organization. However, they also offer extended capabilities of collecting requirements metrics. Hence of, we likely to concentrate on the each and every phase of analysis in the life cycle of development of the software in context to security by incorporating to the requirement.

Authors and Affiliations

)P. Mahizharuvi,

Keywords

Related Articles

FPGA based implementation of Interoperability of Wireless mesh Network and Wi-Fi

Wireless Mesh Networks (WMNs) is a key technology for next generation wireless networks, showing rapid progress and many new inspiring applications. IEEE 802.11s is the standard defined for WLAN mesh networks.One importa...

Enhanced Packet Delivery Techniques Using Crypto-Logic on Jamming Attacks for Wireless Communication Medium

In this paper, we address the problem of jamming under an internal threat model. We discuss about Swift jamming attacks in wireless networks,presenting a challenger model for selective jamming attacks, which may give to...

A Survey On Report Based Secure Payment Scheme For Multihop Wireless Networks

Multihop wireless networks (MWNs) composed of two end nodes is carried out through a number of intermediate nodes whose function is to relay information from one point to another, without using any kind of fixed wired in...

Precision-Aware and Quantization of Lifting Based DWT Hardware Architecture

This paper presents precision-aware approaches and associated hardware implementations for performing the DWT. By implementing BP architecture and also presents DS design methodologies. These methods enable use of an opt...

 Towards Instructional Design of Ubiquitous Learning Environments

 A remarkable shift of what technologies may offer particularly mobile, wireless and sensor-based ones, i. e. a SF like environment in which ubiquitous and pervasive technologies provide for opportunities only imagi...

Download PDF file
  • EP ID EP130554
  • DOI -
  • Views 85
  • Downloads 0

How To Cite

)P. Mahizharuvi, (2012).  Security requirements in Software Requirements Engineering. International Journal of Computer & organization Trends(IJCOT), 2(5), 128-134. https://europub.co.uk./articles/-A-130554