模糊环境下安全需求的识别

Javed Ahmad, C. W. Mohammad, M. Sadiq
{"title":"模糊环境下安全需求的识别","authors":"Javed Ahmad, C. W. Mohammad, M. Sadiq","doi":"10.1109/ICCCIS51004.2021.9397153","DOIUrl":null,"url":null,"abstract":"The elicitation of software requirements is an essential activity of requirement engineering whose task is to collect, gather, or identity the stakeholders requirements. The requirements elicited are of various types like performance requirements, testing requirements, system requirements, functional requirements, etc. according to the need of the stakeholders. Among all the requirements, security requirements play a crucial role to safeguard valuable information from unauthorized users in an organization. In our review process, we found that security requirements elicitation methods lack in answering that how to gather the security requirements from the selected set of functional requirements when stakeholders take part in decision making process and preferences of the software requirements are specified by the use of linguistic variables. Therefore, in order to tackle this problem, in this paper, for the selection of security requirements we propose a fuzzy-based method, so that identification, authentication, and authorization of security requirements can be elicited only for those requirements which are important according to the security point of view. The applicability of the proposed method is discussed by means of an example.","PeriodicalId":316752,"journal":{"name":"2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"274 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Identification of Security Requirements from the Selected Set of Requirements under Fuzzy Environment\",\"authors\":\"Javed Ahmad, C. W. Mohammad, M. Sadiq\",\"doi\":\"10.1109/ICCCIS51004.2021.9397153\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The elicitation of software requirements is an essential activity of requirement engineering whose task is to collect, gather, or identity the stakeholders requirements. The requirements elicited are of various types like performance requirements, testing requirements, system requirements, functional requirements, etc. according to the need of the stakeholders. Among all the requirements, security requirements play a crucial role to safeguard valuable information from unauthorized users in an organization. In our review process, we found that security requirements elicitation methods lack in answering that how to gather the security requirements from the selected set of functional requirements when stakeholders take part in decision making process and preferences of the software requirements are specified by the use of linguistic variables. Therefore, in order to tackle this problem, in this paper, for the selection of security requirements we propose a fuzzy-based method, so that identification, authentication, and authorization of security requirements can be elicited only for those requirements which are important according to the security point of view. The applicability of the proposed method is discussed by means of an example.\",\"PeriodicalId\":316752,\"journal\":{\"name\":\"2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)\",\"volume\":\"274 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-02-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCIS51004.2021.9397153\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCIS51004.2021.9397153","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

软件需求的获取是需求工程的一项基本活动,其任务是收集、收集或识别涉众需求。根据涉众的需要,所引出的需求是各种类型的,如性能需求、测试需求、系统需求、功能需求等。在所有需求中,安全需求在保护组织中有价值的信息不被未经授权的用户获取方面起着至关重要的作用。在我们的评审过程中,我们发现安全需求的提取方法缺乏回答当利益相关者参与决策过程时,如何从选定的功能需求集合中收集安全需求,并且使用语言变量指定软件需求的偏好。因此,为了解决这一问题,在本文中,对于安全需求的选择,我们提出了一种基于模糊的方法,使得安全需求的识别、认证和授权只能对那些从安全角度来看是重要的需求进行。通过算例讨论了所提方法的适用性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Identification of Security Requirements from the Selected Set of Requirements under Fuzzy Environment
The elicitation of software requirements is an essential activity of requirement engineering whose task is to collect, gather, or identity the stakeholders requirements. The requirements elicited are of various types like performance requirements, testing requirements, system requirements, functional requirements, etc. according to the need of the stakeholders. Among all the requirements, security requirements play a crucial role to safeguard valuable information from unauthorized users in an organization. In our review process, we found that security requirements elicitation methods lack in answering that how to gather the security requirements from the selected set of functional requirements when stakeholders take part in decision making process and preferences of the software requirements are specified by the use of linguistic variables. Therefore, in order to tackle this problem, in this paper, for the selection of security requirements we propose a fuzzy-based method, so that identification, authentication, and authorization of security requirements can be elicited only for those requirements which are important according to the security point of view. The applicability of the proposed method is discussed by means of an example.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信