Combining Functional and Security Requirements’ Processes
نویسندگان
چکیده
Requirements elicitation for a new system requires extensive involvement with stakeholders who usually have varying aims, backgrounds and disciplines, and this process is complicated further if the system has critical security, or other non-functional requirements. Established approaches to the elicitation and analysis of functional and non-functional requirements are very different the former focussing on boundary behaviour and the later on threats to assets. This paper describes how requirements were established for the Distributed Aircraft Maintenance Environment (DAME) system, showing how established practice from both disciplines can be effectively combined, and the interaction and iteration that is needed between functional and non-functional requirements processes in order to meet both their objectives in practice.
منابع مشابه
A Survey on Security Requirements Elicitation and Presentation in Requirements Engineering Phase
Secure software development is the new attention of current world in recent days. Security is the key issue for assuring the quality full software. Since, security is one the non-functional requirement most of the times it is ignored in the requirements phase. But, it is possible to reduce software development cost and time to identify user security requirement in the early stage of the softwar...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملSecurity Requirements Engineering: Analysis and Prioritization
with the increase in the use of software system, security requirement engineering becomes an emergent area of study. Security requirements are constraints to a system which must be satisfied for consistent system. Most of the software engineering processes deals with security constraints during the design or implementation phases which may result into unnecessary constrained system. So the need...
متن کاملبهبود رتبه بندی مخاطرات امنیت اطلاعات با استفاده از مدل های تصمیم گیری چند شاخصه
One of the most important capabilities of information security management systems, which must be implemented in all organizations according to their requirements, is information security risk management. The application of information security risk management is so important that it can be named as the heart of information security management systems. Information security risk rating is conside...
متن کامل