{"title":"基于视点的在线系统安全需求引出","authors":"A. Agarwal, D. Gupta","doi":"10.1109/ICETET.2008.91","DOIUrl":null,"url":null,"abstract":"Security is of great concern for software engineering community for the development of online systems. To handle all the security issues properly we need to have well defined process for Security engineering and this process should be integrated with software development life cycle (SDLC). For integrating security engineering with SDLC the requirement engineers should have clearly understanding of what security requirements are and he/she is able to distinguish security requirements from various architectural and behavioral constraints. In this paper we go on to define a process for security requirements elicitation presenting techniques for activities like requirements discovery, analysis, prioritization and management. With true security requirements identified as early as possible and systematically identified, Architecture team can choose most appropriate mechanism to implement them.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"20","resultStr":"{\"title\":\"Security Requirements Elicitation Using View Points for Online System\",\"authors\":\"A. Agarwal, D. Gupta\",\"doi\":\"10.1109/ICETET.2008.91\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security is of great concern for software engineering community for the development of online systems. To handle all the security issues properly we need to have well defined process for Security engineering and this process should be integrated with software development life cycle (SDLC). For integrating security engineering with SDLC the requirement engineers should have clearly understanding of what security requirements are and he/she is able to distinguish security requirements from various architectural and behavioral constraints. In this paper we go on to define a process for security requirements elicitation presenting techniques for activities like requirements discovery, analysis, prioritization and management. With true security requirements identified as early as possible and systematically identified, Architecture team can choose most appropriate mechanism to implement them.\",\"PeriodicalId\":269929,\"journal\":{\"name\":\"2008 First International Conference on Emerging Trends in Engineering and Technology\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-07-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"20\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 First International Conference on Emerging Trends in Engineering and Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICETET.2008.91\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 First International Conference on Emerging Trends in Engineering and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETET.2008.91","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Requirements Elicitation Using View Points for Online System
Security is of great concern for software engineering community for the development of online systems. To handle all the security issues properly we need to have well defined process for Security engineering and this process should be integrated with software development life cycle (SDLC). For integrating security engineering with SDLC the requirement engineers should have clearly understanding of what security requirements are and he/she is able to distinguish security requirements from various architectural and behavioral constraints. In this paper we go on to define a process for security requirements elicitation presenting techniques for activities like requirements discovery, analysis, prioritization and management. With true security requirements identified as early as possible and systematically identified, Architecture team can choose most appropriate mechanism to implement them.