Secure Software Development through Non-Functional Requirements Modeling

被引:0
作者
Olmsted, Aspen [1 ]
机构
[1] Coll Charleston, Dept Comp Sci, Charleston, SC 29401 USA
来源
INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2016) | 2016年
关键词
Non-Functional Requirements; NFRs; Response time; Concurrency;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the development of a new software solution, users and developers spend the majority of their effort on modeling the functional requirements. The Non-Functional Requirements (NFR) are treated as a second class requirement, ignored until the end of the development cycle. They are often hidden, overshadowed and therefore, frequently neglected or forgotten. They are neglected because NFRs are often difficult to model, develop and test. NFRs become even more important in secure software design. Secure software design requires modeling of the confidentiality and integrity of data passed through the software system, along with the availability requirements of the software system. More research is needed on both the modeling of these requirements along with the mapping of the NFR models into executable software code. To develop robust software that is more resilient to cybersecurity attacks requires NFR modeling to become an integral part of the software development process. In this paper, we focus on the modeling of NFRs and the transformations from UML models into the source code.
引用
收藏
页码:22 / 27
页数:6
相关论文
共 12 条
[1]  
Ajith R., 2010, COMPUTING, P81
[2]   Stakeholders: Who is your system for? [J].
Alexander, I .
COMPUTING & CONTROL ENGINEERING JOURNAL, 2003, 14 (01) :22-26
[3]  
Bruegge B., 2010, OBJECT ORIENTED SOFT, V3rd
[4]  
Charlton S., 2009, BEST PRACT CLOUD COM
[5]  
Glinz M., 2005, 3 WORLD C SOFTW QUAL
[6]  
Mullaney T., 2013, US TODAY
[7]  
*OBJ MAN GROUP, 2007, UN MOD LANG SUP
[8]  
Object Management Group, 2015, OMG FORM VERS UML
[9]  
Object Management Group, 2014, OMG FORM REL VERS OC
[10]  
Pavlovski C., 2008, P 5 AS PAC C CONC MO, V79