{"title":"Identification of Security Requirements from the Selected Set of Requirements under Fuzzy Environment","authors":"Javed Ahmad, C. W. Mohammad, M. Sadiq","doi":"10.1109/ICCCIS51004.2021.9397153","DOIUrl":null,"url":null,"abstract":"The elicitation of software requirements is an essential activity of requirement engineering whose task is to collect, gather, or identity the stakeholders requirements. The requirements elicited are of various types like performance requirements, testing requirements, system requirements, functional requirements, etc. according to the need of the stakeholders. Among all the requirements, security requirements play a crucial role to safeguard valuable information from unauthorized users in an organization. In our review process, we found that security requirements elicitation methods lack in answering that how to gather the security requirements from the selected set of functional requirements when stakeholders take part in decision making process and preferences of the software requirements are specified by the use of linguistic variables. Therefore, in order to tackle this problem, in this paper, for the selection of security requirements we propose a fuzzy-based method, so that identification, authentication, and authorization of security requirements can be elicited only for those requirements which are important according to the security point of view. The applicability of the proposed method is discussed by means of an example.","PeriodicalId":316752,"journal":{"name":"2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"274 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCIS51004.2021.9397153","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The elicitation of software requirements is an essential activity of requirement engineering whose task is to collect, gather, or identity the stakeholders requirements. The requirements elicited are of various types like performance requirements, testing requirements, system requirements, functional requirements, etc. according to the need of the stakeholders. Among all the requirements, security requirements play a crucial role to safeguard valuable information from unauthorized users in an organization. In our review process, we found that security requirements elicitation methods lack in answering that how to gather the security requirements from the selected set of functional requirements when stakeholders take part in decision making process and preferences of the software requirements are specified by the use of linguistic variables. Therefore, in order to tackle this problem, in this paper, for the selection of security requirements we propose a fuzzy-based method, so that identification, authentication, and authorization of security requirements can be elicited only for those requirements which are important according to the security point of view. The applicability of the proposed method is discussed by means of an example.