CFP last date
20 August 2024
Call for Paper
September Edition
IJCA solicits high quality original research papers for the upcoming September edition of the journal. The last date of research paper submission is 20 August 2024

Submit your paper
Know more
Reseach Article

Survey on Security Measures of Software Requirement Engineering

by R.saranya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 90 - Number 17
Year of Publication: 2014
Authors: R.saranya
10.5120/15811-4615

R.saranya . Survey on Security Measures of Software Requirement Engineering. International Journal of Computer Applications. 90, 17 ( March 2014), 12-19. DOI=10.5120/15811-4615

@article{ 10.5120/15811-4615,
author = { R.saranya },
title = { Survey on Security Measures of Software Requirement Engineering },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 90 },
number = { 17 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 12-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume90/number17/15811-4615/ },
doi = { 10.5120/15811-4615 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:11:16.730168+05:30
%A R.saranya
%T Survey on Security Measures of Software Requirement Engineering
%J International Journal of Computer Applications
%@ 0975-8887
%V 90
%N 17
%P 12-19
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Software engineering concerns with wide use of engineering principles to achieve cost-effective software with potentiality to function on real machines. Requirement engineering in software development is more crucial. Everyone agrees that security is difficult. The requirements engineering principles are framed based on an idea that would engage the community overcoming complex problems. Security is about the prevention of several difficulties due to the presence of attackers behaving malicious activities. Software security is incredible due to the intrinsically complex task and the problem happens because of three main reasons such as networks are everywhere, systems are easily extensible and system complexity is rising. The principle objective of requirement engineering research is not just to point out the fact about security risks keep on rising every day, but rather to defeat attack, just as any other system property. Security should be tackled at the beginning of the software lifecycle. This survey planned to concentrate on the requirements phase as security is a system property.

References
  1. Soo Ling Lim, and Anthony Finkelstein, "StakeRare: Using Social Networks and Collaborative Filtering for Large-Scale Requirements Elicitation", IEEE Transactions on Software Engineering, Volume: 38 Issue: 3, May-June 2012.
  2. Charles B. Haley, Robin Laney, Jonathan D. Moffett, and Bashar Nuseibeh, "Security Requirements Engineering: A Framework for Representation and Analysis", IEEE Transactions on Software Engineering, vol. 34, no. 1, January/February 2008.
  3. Silvia T. Acuña a, John W. Castro a, Natalia Juristo, "A HCI technique for improving requirements elicitation", Elsevier Science Direct on Information and Software Technology, July 2012.
  4. Han Lai, Rong Peng, Dong Sun, Jia Liu, Chongqing, "A Lightweight Forum-based Distributed Requirement Elicitation Process for Open Source Community", International Journal of Advancements in Computing Technology, Volume4, Number7, April 2012.
  5. Carla Pacheco, Ivan Garcia, "A systematic literature review of stakeholder identification methods in requirements elicitation", Elsevier, Systems and Software, April 2012.
  6. Mohd. Sadiq, Mohd. Shahid and Shabbir Ahmad, "Adding Threat during Software Requirements Elicitation and Prioritization", International Journal of Computer Applications (0975 – 8887), Volume 1 – No. 9, 2010.
  7. Aida Azadegan, K. Nadia Papamichail, Pedro Sampaio, "Applying collaborative process design to user requirements elicitation: A case study", Elsevier, Science Direct on Computers in Industry, May 2013.
  8. Omar Isam Al Mrayat, Norita Md Norwawi, and Nurlida Basir, "Appreciative Inquiry in Eliciting Software Requirements", International Journal of Computer Science and Electronics Engineering (IJCSEE) Volume 1, Issue 3, 2013.
  9. Rahman A. N. and Sahibuddin S. , "Extracting Soft Issues during Requirements Elicitation: A Preliminary Study", International Journal of Information and Electronics Engineering, Vol. 1, No. 2, September 2011.
  10. Mohd. Sadiq, Javed Ahmad, Abdul Rahman, R. Suman and Shweta Khandelwal, "More on Adding Threat during Software Requirements Elicitation and Prioritization", International Journal of Engineering and Technology, Vol. 2, No. 3, June 2010.
  11. Stefan Farfeleder, Thomas Moser, Andreas Krall, Tor St?alhane, Inah Omoronyia, and Herbert Zojer, "Ontology-Driven Guidance for Requirements Elicitation", Springer / ACM, The semantic web: research and applications, 2011.
  12. P. Deepika1, P. S. Smitha, "Requirement elicitation based Collborative filtering using social Networks", International Journal of Emerging Technology and Advanced Engineering, Volume 3, Special Issue 1, January 2013.
  13. M. Unterkalmsteiner, R. Feldt, T. Gorschek, "A Taxonomy for Requirements Engineering and Software Test Alignment", ACM Transactions on Software Engineering and Methodology, January 2013.
  14. Travis D. Breaux, David G. Gordon, "Regulatory Requirements Traceability and Analysis Using Semi-Formal Specifications", Springer /ACM, Requirements Engineering: Foundation for Software Quality, 2013.
  15. Yuqing Sun, Bin Gong, Xiangxu Meng, Zongkai Lin, Elisa Bertino, "Specification and enforcement of flexible security policy for active cooperation", Elsevier Science Direct on Information Sciences, 2009.
  16. Joaquín Nicolás, Ambrosio Toval, "On the generation of requirements specifications from software engineering models: A systematic literature review" Elsevier science Direct on Information and Software Technology, 2009.
  17. Tom Gilb, "What's Wrong with Requirements Specification? An Analysis of the Fundamental Failings of Conventional Thinking about Software Requirements, and Some Suggestions for Getting it Right", Journal of Software Engineering & Applications, 2010.
  18. Alex Coman, Boaz Ronen, "Icarus' predicament: Managing the pathologies of overspecification and overdesign", Elsevier science Direct on Project Management, 2010.
  19. Balsam A. Mustafa,Hamayoon Ghafory, "Investigating the Inspection Effectiveness of Software Requirements Specification with UML Diagrams: A Concept Paper", Journal of Emerging Trends in Computing and Information Sciences, Vol. 4, No. 11 November 2013.
  20. Olabiyisi S. O. , Adetunji A. B, Olusi T. R, "Using Software Requirement Specification as Complexity Metric for Multi-Paradigm Programming Languages", International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 3, March 2013.
  21. Kenneth Boness, Anthony Finkelstein, Rachel Harrison, "A method for assessing confidence in requirements analysis", Elsevier Science Direct on Information and Software Technology, May 2011.
  22. Tuong Huan Nguyen, Bao Quoc Vo, Markus Lumpe, and John Grundy, "REInDetector: A Framework for Knowledge-based Requirements Engineering", IEEE/ ACM, Automated Software Engineering, 2012.
  23. Betty H. C. Cheng, Rog´erio de Lemos, Holger Giese, Paola Inverardi, and Jeff Magee, "Software Engineering for Self-Adaptive Systems: A Research Roadmap", Springer, Self-Adaptive Systems, 2009.
  24. Gursimran Singh Walia, Jeffrey C. Carver, "A systematic literature review to identify and classify software requirement errors", Elsevier Science Direct on Information and Software Technology, 2009.
  25. Manish Agrawal and Kaushal Chari, "Software Effort, Quality, and Cycle Time: A Study of CMM Level 5 Projects", IEEE Transactions on Software Engineering, vol. 33, no. 3, March 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Software engineering requirement engineering security software development