CFP last date
22 April 2024
Reseach Article

ReqPriSec: Security and Privacy aware Web-based Versatile Requirement Engineering Tool

by Tejas Shah, S. V. Patel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 23
Year of Publication: 2019
Authors: Tejas Shah, S. V. Patel
10.5120/ijca2019919071

Tejas Shah, S. V. Patel . ReqPriSec: Security and Privacy aware Web-based Versatile Requirement Engineering Tool. International Journal of Computer Applications. 178, 23 ( Jun 2019), 22-37. DOI=10.5120/ijca2019919071

@article{ 10.5120/ijca2019919071,
author = { Tejas Shah, S. V. Patel },
title = { ReqPriSec: Security and Privacy aware Web-based Versatile Requirement Engineering Tool },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2019 },
volume = { 178 },
number = { 23 },
month = { Jun },
year = { 2019 },
issn = { 0975-8887 },
pages = { 22-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number23/30675-2019919071/ },
doi = { 10.5120/ijca2019919071 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:51:13.773403+05:30
%A Tejas Shah
%A S. V. Patel
%T ReqPriSec: Security and Privacy aware Web-based Versatile Requirement Engineering Tool
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 23
%P 22-37
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Requirement Engineering is the process of eliciting, analysing, negotiating, specifying and managing functional and non functional requirements of a system. The RE phase faces some challenges like managing ambiguous, incomplete and inconsistent requirements; specifying requirements in unstructured format; inefficient elicitation of requirements from stakeholders and managing various artefacts of requirements along with non functional requirements. These challenges may arise in any software development methodologies and may hinder the progress of project and system development. The security and privacy requirements have not given much attention in RE. There is a strong need of versatile and security-privacy aware RE tool to elicit, manage and specify requirement efficiently and in standardized format. This paper proposes a unique, security-privacy aware “ReqPriSec” tool to manage and store the requirements in objective manner without major efforts of natural language requirement statements. The “ReqPriSec” tool is tested and evaluated based on different parameters on E-voting case study.

References
  1. D. Firesmith, “Quality Requirements Checklist,” Journal of Object and Technology, vol. 4, no. 9, pp. 31–38, 2005.
  2. The Standish Group, “The Standish CHAOS Report 2014,” 2014.
  3. M. Jørgensen and K. Moløkken, “How Large Are Software Cost Overruns?”,A Review of the 1994 CHAOS Report.”
  4. H. Meth, M. Brhel, and A. Maedche, “The state of the art in automated requirements elicitation,” Information and Software Technology, vol. 55, no. 10, pp. 1695–1709, Oct. 2013.
  5. B. H. C. Cheng and J. M. Atlee, “Research Directions in Requirements Engineering”, Future of Software Engineering (FOSE ’07), 2007, pp. 285–303.
  6. D. Firesmith, “Modern Requirements Specification” JOURNAL OF OBJECT TECHNOLOGY, vol. 2, no. 1, pp. 53–64, 2003.
  7. J. M. Carrillo de Gea, J. Nicolás, J. L. F. Alemán, A. Toval, C. Ebert, and A. Vizcaíno, “Requirements Engineering Tools,” IEEE Software, vol. 28, no. 4, pp. 86–91, Jul. 2011.
  8. “ISO/IEC TR 24766:2009, Information technology - Systesm and software engineering - Guide for requirements engineering tool capabilities,” Geneva, Switzerland, 2009.
  9. J. M. Carrillo de Gea, J. Nicolás, J. L. Fernández Alemán, A. Toval, C. Ebert, and A. Vizcaíno, “Requirements engineering tools: Capabilities, survey and assessment,” Information and Software Technology, vol. 54, no. 10, pp. 1142–1157, Oct. 2012.
  10. “Requirement Heap download | SourceForge.net.” [Online]. Available: https://sourceforge.net/projects/reqheap/. [Accessed: 19-Apr-2019].
  11. “rmToo – Free and Open Source Requirements Management Tool.” [Online]. Available: http://rmtoo.florath.net/. [Accessed: 16-Apr-2019].
  12. “Open Source Requirements Management Tool download | SourceForge.net.” [Online]. Available: https://sourceforge.net/projects/osrmt/. [Accessed: 19-Mar-2019].
  13. “Modelio Open Source - UML and BPMN free modeling tool.” [Online]. Available: https://www.modelio.org/. [Accessed: 20-Apr-2019].
  14. R. Alexandrian et al., “Requirements Management Tool Evaluation Report,” 2016.
  15. “Weblet Importer.” [Online]. Available: https://www.coe.int/t/dgap/goodgovernance/activities/e-voting/work_of_evoting_committee/03_background_documents/92IP1(2002)23_en.asp. [Accessed: 24-Feb-2019].
  16. “Voting System Standards, Testing and Certification.” [Online].Availablehttp://www.ncsl.org/research/elections-and-campaigns/voting-system-standards-testing-and-certification.aspx. [Accessed: 24-Apr-2019].
Index Terms

Computer Science
Information Sciences

Keywords

Requirement Engineering Non Functional Requirement RE tool Security Requirements Privacy Requirements