Security, Privacy and Trust Oriented Requirements Modeling for Examination System

被引:0
|
作者
Shah, Tejas R.
Patel, S., V
机构
关键词
Requirement engineering; security; privacy; trust; RE stages; online examination system;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The requirement engineering phase of Software Engineering (SE) deals with various activities starting from customer interaction to specifications of the requirements for the designing initiative. Now-a-days security, privacy and trustworthiness have become additional set of crucial requirements in view of the fact that software is vulnerable to various attacks. Many existing paradigms of SE deal with requirements, but less attention has been paid to address the issues of security, privacy and trust implementations. In practice, major attention is given to incorporate security aspects during coding and testing phases. Some paradigms address these issues, but they consider either security or privacy or trust requirements but not all of them together. We believe that security, privacy and trust requirements must be well collected, analyzed and specified through various stages of Requirement Engineering (RE) itself. This paper attempts to model RE activities incorporating security, privacy and trust requirements in effective way during all sub stages of RE phase. The activities of requirements modeling are well detailed and supported with case study of an online examination system of higher education (like University).
引用
收藏
页数:6
相关论文
共 50 条
  • [21] ACCESS CONTROL REQUIREMENTS FOR PRIVACY AND SECURITY
    KINGSLAKE, R
    INFORMATION PRIVACY, 1979, 1 (07): : 312 - 314
  • [22] Using trust assumptions with security requirements
    Haley, CB
    Laney, RC
    Moffett, JD
    Nuseibeh, B
    REQUIREMENTS ENGINEERING, 2006, 11 (02) : 138 - 151
  • [23] A Perspective on Security and Trust Requirements for the Future
    Plaks, Kenneth
    PROCEEDINGS OF THE 2019 INTERNATIONAL SYMPOSIUM ON PHYSICAL DESIGN (ISPD '19), 2019, : 73 - 73
  • [24] Using trust assumptions with security requirements
    Charles B. Haley
    Robin C. Laney
    Jonathan D. Moffett
    Bashar Nuseibeh
    Requirements Engineering, 2006, 11 : 138 - 151
  • [25] A Formal Model of Trust and Security for Task-Oriented Information System
    Wei-Peng, Liu
    Ju, Hu
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 502 - 506
  • [26] Trust in Data Security Protocols and Knowledge of Privacy and Security Technology
    Lyon, Gregory
    IEEE SECURITY & PRIVACY, 2024, 22 (02) : 29 - 37
  • [27] Ethics of Big Data: Privacy, Security and Trust
    Yarali, Abdulrahman
    Joyce, Randall
    Dixon, Brandon
    2020 WIRELESS TELECOMMUNICATIONS SYMPOSIUM (WTS), 2020,
  • [28] TRUST, SECURITY AND PRIVACY OF 6G
    Yan, Zheng
    Yang, Laurence T.
    Li, Tieyan
    Miche, Yoan
    Yu, Shui
    Yau, Stephen S.
    IEEE NETWORK, 2022, 36 (04): : 100 - 102
  • [29] Trust, Security and Privacy in Emerging Distributed Systems
    Abawajy, Jemal
    Wang, Guojun
    Yang, Laurence T.
    Javadi, Bahman
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 : 224 - 226
  • [30] Exploring Trust, Security and Privacy in Digital Business
    Fischer-Hubner, Simone
    Furnell, Steven
    Lambrinoudakis, Costas
    TRANSACTIONS ON LARGE-SCALE DATA- AND KNOWLEDGE-CENTERED SYSTEMS I, 2009, 5740 : 191 - 210