Universiti Teknologi Malaysia Institutional Repository

Measuring security in requirements engineering

Besrour, Souhaib and Ghani, Imran (2012) Measuring security in requirements engineering. International Journal of Informatics and Communication Technology (IJ-ICT), 1 (2). pp. 72-81. ISSN 2252-8776

Full text not available from this repository.

Official URL: https://www.iaescore.com/journals/index.php/IJICT/...

Abstract

The aim of this paper is to measure the security and related verification method in requirements engineering (RE). There are a few existing approaches to measure RE performance like IEEE Software Requirements Specification (SRS) and Security Quality Requirements Engineering (SQUARE). However, these existing approaches have some limitations such as lack of flexibility and require long implementation period. In order to address these issues, this paper intends to propose a new set of tools. First is the Effective Security Check List (ESCL), which is a check list with security questions that should be considered for measuring security. Secondly, the Traceability Matrix(TM), which is a two dimensional matrix to measure security during RE. Thirdly, Requirement Engineering Assessment Document (READ), which is a tool containing all statistical information about security performance during RE. The combination of presented approaches had been implemented in a case study. The outcome results are encouraging and illustrated integrated outcomes within existing RE model. The security level had also been properly measured.

Item Type:Article
Uncontrolled Keywords:requirement engineering, requirement quality, measuring security, software equipment
Subjects:Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions:Computer Science and Information System
ID Code:31070
Deposited By: Yanti Mohd Shah
Deposited On:03 Mar 2014 08:39
Last Modified:30 Nov 2018 07:09

Repository Staff Only: item control page