Examination and Classification of Security Requirements of Software Systems

作者: T.R. Farkhani , M.R. Razzazi

DOI: 10.1109/ICTTA.2006.1684851

关键词: Software requirements specificationNon-functional testingRisk analysis (engineering)RequirementRequirements managementNon-functional requirementRequirements engineeringSecurity engineeringRequirements analysisComputer science

摘要: Currently, there exist different classifications of software requirements having direct impact on requirement engineering and analysis. These usually categorize into two classes functional non-functional requirements. Contrary to the requirements, are many methods tools supporting verification, analysis, design from early phases project. Since security vital in a system, their kind classification as or very important development secure systems. Current approaches, consider validation verification deferred until test phase. This causes weakness target system solving leaks costs much. Some approaches also develop an isolated process but it puts extra overhead non-standard decreases integrity In this paper, some major examined compared, finally, new is proposed.

参考文章(7)
Lawrence Chung, Representation and utilization of non-functional requirements for information system design conference on advanced information systems engineering. pp. 5- 30 ,(1991) , 10.1007/3-540-54059-8_78
Jonathan D Moffett, Charles B Haley, Bashar Nuseibeh, Core Security Requirements Artefacts ,(2004)
Donald Firesmith, Engineering Security Requirements The Journal of Object Technology. ,vol. 2, pp. 53- 68 ,(2003) , 10.5381/JOT.2003.2.1.C6
Lawrence Chung, Julio Cesar Sampaio do Prado Leite, On Non-Functional Requirements in Software Engineering Conceptual Modeling: Foundations and Applications. pp. 363- 379 ,(2009) , 10.1007/978-3-642-02463-4_19
Lawrence Chung, Brian A. Nixon, Dealing with non-functional requirements: three experimental studies of a process-oriented approach international conference on software engineering. pp. 25- 37 ,(1995) , 10.1145/225014.225017
I. Alexander, Misuse cases help to elicit non-functional requirements Computing & Control Engineering Journal. ,vol. 14, pp. 40- 45 ,(2003) , 10.1049/CCE:20030108
David F. Ferraiolo, D. Richard Kuhn, Role-Based Access Controls 15th National Computer Security Conference (NCSC); October 13-16, 1992; Baltimore, Maryland, United States. pp. 554- 563 ,(1992)