Security Requirements Specification and Tracing within Topological Functioning Model
نویسندگان
چکیده
Specification and traceability of security requirements is still a challenge since modeling analysis aspects systems require additional efforts at the very beginning software development. The topological functioning model formal mathematical that can be used as reference for functional non-functional system. It also serve requirements. purpose this study to determine approach how specified traced using model. This article demonstrates suggested explains its potential benefits limitations.
منابع مشابه
Requirements Specification and Model-based Knowledge Engineering
Knowledge Engineering (KE) and Software Engineering (SE) have similar goals: developing methods, techniques, and tools for the building process of either knowledge based systems (kbs) or (complex) traditional software. Due to this kinship it seems obvious to analyse to which extent both areas, KE and SE, can benefit from each other. In this paper we want to argue from the KE point of view. The ...
متن کاملAddressing Security Requirements within the SPACE System
Sammendrag/Abstract: The SPACE project developed a fully functional demonstrator of a system aimed at supporting European citizens moving between countries within the EU and the EEA. The project also established several security requirements for a production system. These are only partially addressed in the demonstrator. This paper presents these requirements and their implications as well as p...
متن کاملTracing Requirements
Requirements are at the core of all project deliverables. Ensuring that all project requirements are achieved by the project can be difficult to validate if no further means of tracing requirements is employed. Requirements traceability hence is a critical component of any project, as it provides the ability for a project to articulate how any given requirement has been met by the project deliv...
متن کاملA Tool-based Semantic Framework for Security Requirements Specification
Attaining high quality in security requirements specification requires first-rate professional expertise, which is scarce. In fact, most organisations do not include core security experts in their software team. This scenario motivates the need for adequate tool support for security requirements specification so that the human requirements analyst can be assisted to specify security requirement...
متن کاملAspect-oriented specification of threat-driven security requirements
This paper presents an aspect-oriented approach to integrated specification of functional and security requirements based on use-case-driven software development. It relies on explicit identification of security threats and threat mitigations. We first identify security threats with respect to use-case-based functional requirements in terms of security goals and the STRIDE category. Then, we su...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Complex Systems Informatics and Modeling Quarterly
سال: 2022
ISSN: ['2255-9922']
DOI: https://doi.org/10.7250/csimq.2022-32.02