Security in Software Engineering Requirement

被引:0
|
作者
Al-Shorafat, Wafa Slaibi [1 ]
机构
[1] Al al Bayt Univ, Prince Hussein Bin Abdullah Coll, IT Fac, Dept Informat Syst, Marfaq, Jordan
关键词
component; Seure; Requirement; secure recuirement;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A system can't have high assurance if it has poor security requirement, so for high assurance system will logically include security requirement as well as reliability, robustness security requirement is one of quality factors that systems try to satisfy which considered as another quality factor in a quality model. The close similarity between these two quality factors implies that a classification safety-related requirement is a good place to begin when developing an taxonomy of security-related requirements. The resulting taxonomy consists of pure security requirements specifying minimum acceptable amounts of security, security-significant requirements which are non-security requirements with important security ramifications, security system requirements specifying requirements for security architectural components, and security constraints.
引用
收藏
页码:666 / 673
页数:8
相关论文
共 50 条
  • [41] A Review Paper : Security Requirement Patterns for a Secure Software Development
    Yahya, Syazwani
    Kamalrudin, Massila
    Sidek, Safiah
    Jaimun, Munaliza
    Yusof, Junaidah
    Hua, Ang Kean
    Gani, Paran
    [J]. 2019 1ST INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND DATA SCIENCES (AIDAS2019), 2019, : 146 - 151
  • [42] Applying a Requirement Engineering Based Approach to Evaluate the Security Requirements Engineering Methodologies
    Bulusu, Sravani Teja
    Laborde, Romain
    Wazan, Ahmad Samer
    Barrere, Francois
    Benzekri, Abdelmalek
    [J]. 33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 1316 - 1318
  • [43] A Software Security Requirement Quality Improvement Procedure to Increase E-Commerce Security
    Lai, Sen-Tarng
    Leu, Fang-Yie
    Chu, William Cheng-Chung
    [J]. 2013 EIGHTH INTERNATIONAL CONFERENCE ON BROADBAND, WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2013), 2013, : 366 - 371
  • [44] Integrating Security and Privacy in Quantum Software Engineering
    Barletta, Vita Santa
    Caivano, Danilo
    Pal, Anibrata
    [J]. PROCEEDINGS OF 2024 28TH INTERNATION CONFERENCE ON EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING, EASE 2024, 2024, : 538 - 547
  • [45] Ontology Based Patterns for Software Security Engineering
    Moradian, Esmiralda
    Hakansson, Anne
    Andersson, Jan-Olof
    [J]. ADVANCES IN KNOWLEDGE-BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, 2012, 243 : 406 - 419
  • [46] Software Architectural Design meets Security Engineering
    Bode, Stephan
    Fischer, Anja
    Kuehnhauser, Winfried
    Riebisch, Matthias
    [J]. 16TH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOP ON THE ENGINEERING OF COMPUTER BASED SYSTEMS, PROCEEDINGS, 2009, : 109 - 118
  • [47] Security and Software Engineering: Analyzing Effort and Cost
    Brill, Callum
    Olmsted, Aspen
    [J]. THIRD INTERNATIONAL CONFERENCE ON ADVANCES AND TRENDS IN SOFTWARE ENGINEERING (SOFTENG 2017), 2017, : 110 - 113
  • [48] The Study on Network Security based on Software Engineering
    Jia Shande
    Ao Qian
    [J]. FOURTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2012), 2012, 8334
  • [49] Software Security Requirements Engineering: State of the Art
    Ramachandran, Muthu
    [J]. GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 313 - 322
  • [50] Vulnerabilities and Threats in Cloud Software Engineering Security
    Yu, Weider D.
    Runiassy, Maryam
    Yin, Yijun
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 1822 - 1831