CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Questionnaire based Approach to Measure Security in Requirement Engineering

by Souhaib Besrour, Imran Ghani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 54 - Number 9
Year of Publication: 2012
Authors: Souhaib Besrour, Imran Ghani
10.5120/8596-2359

Souhaib Besrour, Imran Ghani . Questionnaire based Approach to Measure Security in Requirement Engineering. International Journal of Computer Applications. 54, 9 ( September 2012), 31-34. DOI=10.5120/8596-2359

@article{ 10.5120/8596-2359,
author = { Souhaib Besrour, Imran Ghani },
title = { Questionnaire based Approach to Measure Security in Requirement Engineering },
journal = { International Journal of Computer Applications },
issue_date = { September 2012 },
volume = { 54 },
number = { 9 },
month = { September },
year = { 2012 },
issn = { 0975-8887 },
pages = { 31-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume54/number9/8596-2359/ },
doi = { 10.5120/8596-2359 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:55:16.702713+05:30
%A Souhaib Besrour
%A Imran Ghani
%T Questionnaire based Approach to Measure Security in Requirement Engineering
%J International Journal of Computer Applications
%@ 0975-8887
%V 54
%N 9
%P 31-34
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The aim of this paper is to measure security in requirement engineering using questionnaire based approach. The questionnaire is applied in the four stages of requirement engineering (Elicitation, analyses, validation, management). The questionnaire based approach is composing of three main parts . First the security questions part . Second the evaluation part which should be filled by the stakeholders . Third the assessment part . Finally A case study conducted to apply Questionnaire based approach and to measure security in requirement engineering.

References
  1. Ian Sommerville . software engineering 9th Edition , ISBN-10: 0137035152 | ISBN-13: 978-0137035151 | Publication Date: March 13, 2010
  2. Lusiamich, Roberto GariglianoAmbiguity measures in requirement engineering. 2000
  3. Daniel Rodriguez, Israel HerraizandRachelHarrison,On Software Engineering Repositories and Their Open Problems,May 2012.
  4. Leif Singer and Kurt Schneider, Influencing the Adoption of Software Engineering Methods Using Social Software, Hannover, Germany 2012.
  5. Stuart Anderson and Massimo Felici Laboratory . Requirements Engineering questionair,University of Edinburgh James, 3JZ Scotland, UK. January 2001.
  6. Royce, W. W. 'Managing the Development of Large Software Systems: Concepts and Techniques', IEEE Westcon, international conference on Software Engineering. 1970.
  7. Thayer, R. H. , and M. Dorfman (eds. ), System and Software Requirements Engineering, IEEE Computer Society Press, Los Alamitos, CA, 1990.
  8. ChristofEbert ,Practice: Requirements Engineering in Global Teams. 2011
  9. ACM (2006). "Computing Degrees & Careers". ACM. Retrieved 2010-11-23.
  10. Laplante, Phillip (2007). What Every Engineer Should Know about Software Engineering. Boca Raton: CRC. ISBN 9780849372285. Retrieved 2011-01-21.
  11. Peter, Naur; Brian Randell (7–11 October 1968). "Software Engineering: Report of a conference sponsored by the NATO Science Committee" (PDF). Garmisch, Germany: Scientific Affairs Division, NATO. Retrieved 2008-12-26.
  12. Randell, Brian . "The 1968/69 NATO Software Engineering Reports". NewcastleUniversity. Retrieved 2008.
  13. Kotonya G. and Sommerville, I. Requirements Engineering: Processes and Techniques. Chichester, UK: John Wiley & Sons. 1998 .
  14. Phillip A. Laplante What Every Engineer Should Know about Software Engineering. Page 44. (2007).
  15. Zave, P. 'Classification of Research Efforts in Requirements Engineering'. ACM Computing Surveys, 29(4): 315-321, 1997.
  16. Software Requirements Engineering Methodology (Development) Alfor,M. W. and Lawson,J. T. TRW Defense and Space Systems Group. 1979.
  17. Requirements bibliography Reviewed November 10th 2011
Index Terms

Computer Science
Information Sciences

Keywords

Requirements Engineering Questionnaire based approach Measuring Security Requirement Engineering Quality