Identification of Security Requirements from the Selected Set of Requirements under Fuzzy Environment

被引:1
作者
Ahmad, Javed [1 ]
Mohammad, Chaudhary Wali [1 ]
Sadiq, Mohd [2 ]
机构
[1] Jamia Millia Islamia, Fac Engn & Technol, Dept Appl Sci & Humanities, New Delhi 110025, India
[2] Indian Inst Sci, Dept Comp Sci & Automat, Bangalore 560012, Karnataka, India
来源
2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS) | 2021年
关键词
Requirements Elicitation; Functional Requirements; Fuzzy Set Theory; Security Requirements; Institute Examination System;
D O I
10.1109/ICCCIS51004.2021.9397153
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Theelicitation of software requirements is an essential activity of requirement engineering whose task is to collect, gather, or identify the stakeholders requirements. The requirements elicited are of various types like performance requirements, testing requirements, system requirements, functional requirements, etc. according to the need of the stakeholders. Among all the requirements, security requirementsplay a crucial role to safeguard valuable information from unauthorized users in an organization. In ourreview process, we found that security requirements elicitation methods lack in answering that how to gather the security requirementsfrom the selected set of functional requirements when stakeholders take part in decision making process and preferences of the software requirements are specified by the use of linguistic variables. Therefore, in order to tackle this problem,in this paper, for the selection of security requirements we propose a fuzzy-based method, so that identification, authentication, and authorization of security requirements can be elicited only for those requirements which are important according to the security point of view. The applicability of the proposed method is discussed by means of an example.
引用
收藏
页码:58 / 63
页数:6
相关论文
共 12 条
[1]  
[Anonymous], 2012, Advances in communication, network, and computing, 108. Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering, DOI DOI 10.1007/978-3-642-35615-5_48
[2]  
Chen S.H., 2020, 6 INT C FUZZY THEORY, P1
[3]  
Chung L, 2009, LECT NOTES COMPUT SC, V5600, P363, DOI 10.1007/978-3-642-02463-4_19
[4]   A comparison of security requirements engineering methods [J].
Fabian, Benjamin ;
Guerses, Seda ;
Heisel, Maritta ;
Santen, Thomas ;
Schmidt, Holger .
REQUIREMENTS ENGINEERING, 2010, 15 (01) :7-40
[5]  
Firesmith Donald., 2003, J OBJECT TECHNOL, V2, P53, DOI DOI 10.5381/JOT.2003.2.1.C6
[6]   A systematic review of security requirements engineering [J].
Mellado, Daniel ;
Blanco, Carlos ;
Sanchez, Luis E. ;
Fernandez-Medina, Eduardo .
COMPUTER STANDARDS & INTERFACES, 2010, 32 (04) :153-165
[7]   Impact of symmetrical short-circuit fault on doubly-fed induction generator controller [J].
Nazir, Muhammad Shahzad ;
Qi, Wang .
INTERNATIONAL JOURNAL OF ELECTRONICS, 2020, 107 (12) :2028-2043
[8]  
Sadiq M., 2020, INT J COMPUT APPL, P1
[9]  
Saeki M, 2009, LECT NOTES COMPUT SC, V5421, P185, DOI 10.1007/978-3-642-01648-6_20
[10]   Eliciting security requirements with misuse cases [J].
Sindre, G ;
Opdahl, AL .
REQUIREMENTS ENGINEERING, 2005, 10 (01) :34-44