Security in Software Engineering Requirement

被引:0
|
作者
Al-Shorafat, Wafa Slaibi [1 ]
机构
[1] Al al Bayt Univ, Prince Hussein Bin Abdullah Coll, IT Fac, Dept Informat Syst, Marfaq, Jordan
关键词
component; Seure; Requirement; secure recuirement;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A system can't have high assurance if it has poor security requirement, so for high assurance system will logically include security requirement as well as reliability, robustness security requirement is one of quality factors that systems try to satisfy which considered as another quality factor in a quality model. The close similarity between these two quality factors implies that a classification safety-related requirement is a good place to begin when developing an taxonomy of security-related requirements. The resulting taxonomy consists of pure security requirements specifying minimum acceptable amounts of security, security-significant requirements which are non-security requirements with important security ramifications, security system requirements specifying requirements for security architectural components, and security constraints.
引用
收藏
页码:666 / 673
页数:8
相关论文
共 50 条
  • [1] Software Engineering for Security as a Non-functional Requirement
    Ragab, Noha
    Ahmed, Ali
    AlHashmi, Saadat
    [J]. INTELLIGENT DATA ANALYSIS AND APPLICATIONS, 2015, 370 : 347 - 357
  • [2] Software engineering: risk features in requirement engineering
    Bhukya, Shankar Nayak
    Pabboju, Suresh
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 6): : 14789 - 14801
  • [3] Software engineering: risk features in requirement engineering
    Shankar Nayak Bhukya
    Suresh Pabboju
    [J]. Cluster Computing, 2019, 22 : 14789 - 14801
  • [4] Security requirement engineering at a telecom provider
    Zuccato, Albin
    Endersz, Viktor
    Daniels, Nils
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1139 - 1147
  • [5] Metabolic Algorithm for Software Requirement Engineering
    Pavanasam, Velayutham
    Subramaniam, Chandrasekaran
    [J]. MANUFACTURING SYSTEMS AND INDUSTRY APPLICATIONS, 2011, 267 : 639 - 644
  • [6] A Scrutiny of the Software Requirement Engineering process
    Geogy, Manju
    Dharani, Andhe
    [J]. 1ST GLOBAL COLLOQUIUM ON RECENT ADVANCEMENTS AND EFFECTUAL RESEARCHES IN ENGINEERING, SCIENCE AND TECHNOLOGY - RAEREST 2016, 2016, 25 : 405 - 410
  • [7] An Analysis for Understanding Software Security Requirement Methodologies
    Du, Jing
    Yang, Ye
    Wang, Qing
    [J]. 2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 141 - 149
  • [8] Software engineering and security engineering - An argument for merger
    Vaughn, RB
    Frew, B
    Mayfield, T
    Boggess, JE
    Abrams, MD
    [J]. 12TH CONFERENCE ON SOFTWARE ENGINEERING EDUCATION AND TRAINING, PROCEEDINGS, 1999, : 74 - 75
  • [9] Holistic security requirement engineering for electronic commerce
    Zuccato, A
    [J]. COMPUTERS & SECURITY, 2004, 23 (01) : 63 - 76
  • [10] Security as a Functional Requirement in the Future of Systems Engineering
    Willett, Keith D.
    [J]. INCOSE International Symposium, 2021, 31 (01) : 195 - 209