Analysing Security and Software Requirements using Multi-Layered Iterative Model
نویسندگان
چکیده
Nowadays, security is of great concern for any organization developing software systems for various requirements. Moreover, the same becomes more complicated during integration of security measures with agile software development methodology due to its lightweight informal nature. The requirements engineering is considered as one of the key element associated with any software development process. This motivates us to suggest a FLAMIRA model that provides seamless integration of security needs with software requirements in an iterative manner. In agile processes, requirements are recorded in the form of user stories developed jointly by customer’s representative and the development team. User stories are useful for agile processes as they define requirements using a low-cost, user centric and flexible approach. Keeping this aspect in mind we are integrating abuser stories for security requirements with user stories. FLAMIRA is a multi-layered model which shows us the path to be followed right from the identification of the user stories till the formulation of abuser stories. This paper concludes with a set of user stories and abuser stories to be followed in each iteration. Keywords— Agile Methods, User Stories, Abuser Stories, Requirement engineering.
منابع مشابه
Thermal Behavior of a New Type of Multi-Layered Porous Air Heater
Based on an effective energy conversion method between gas enthalpy and thermal radiation, a multi-layered type of porous air heater has been proposed. In the five layered structure which is analyzed in this work, there are five porous layers which are separated by four quartz glass windows. The main layer operates as a porous radiant burner that products a large amount of thermal radiative ene...
متن کاملSecure Software Development Model
--Extreme programming (XP) is a modern approach for iterative development of software in which you never wait for the complete requirements and start development. Security is usually unnoticed during early phases of software life cycle. In this paper, our main objective is to focus on security requirements at each phase of software life cycle. In this regard, XP is a key solution that provides ...
متن کاملVerifying Security Properties in Unbounded Multiagent Systems
We study the problem of analysing the security for an unbounded number of concurrent sessions of a cryptographic protocol. Our formal model accounts for an arbitrary number of agents involved in a protocol-exchange which is subverted by a Dolev-Yao attacker. We define the parameterised model checking problem with respect to security requirements expressed in temporal-epistemic logics. We formul...
متن کاملTowards an Analytical Role Modelling Framework for Security Requirements
Pressures are increasing on organisations to take a more systematic approach to incorporating security into their software development process. The key to this is analysing security requirements early on, rather than treating security as an add-on, as is often the case. An important component of security requirements is access control, and roles have been found to provide an effective basis for...
متن کاملAnalysing Security Requirements of Information Systems Using Tropos
Security is an important issue when developing complex information systems, however very little work has been done in integrating security concerns during the analysis of information systems. Current methodologies fail to adequately integrate security and systems engineering, basically because they lack concepts and models as well as a systematic approach towards security. We believe that secur...
متن کامل