{"title":"需求工程中安全分类的设计","authors":"T. Shah","doi":"10.5121/cseij.2022.12106","DOIUrl":null,"url":null,"abstract":"Non Functional Requirements (NFR) are important in all phases of software development and results in quality of software to be built. It is observed that security requirements are incorporated and identified later in the software development life cycle. Security as non functional requirements imposes new challenges in managing confidential data and preserving its integrity. The security requirements and related artefacts must be considered from Requirement Engineering (RE) phase to implementation phase. This paper focuses on new design of taxonomy of security in Requirement Engineering. The design covers the major properties of security which are required in developing any web based, secured, confidential and integrity oriented system.","PeriodicalId":361871,"journal":{"name":"Computer Science & Engineering: An International Journal","volume":"279 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Design of Security Taxonomy in Requirement Engineering\",\"authors\":\"T. Shah\",\"doi\":\"10.5121/cseij.2022.12106\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Non Functional Requirements (NFR) are important in all phases of software development and results in quality of software to be built. It is observed that security requirements are incorporated and identified later in the software development life cycle. Security as non functional requirements imposes new challenges in managing confidential data and preserving its integrity. The security requirements and related artefacts must be considered from Requirement Engineering (RE) phase to implementation phase. This paper focuses on new design of taxonomy of security in Requirement Engineering. The design covers the major properties of security which are required in developing any web based, secured, confidential and integrity oriented system.\",\"PeriodicalId\":361871,\"journal\":{\"name\":\"Computer Science & Engineering: An International Journal\",\"volume\":\"279 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-02-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Science & Engineering: An International Journal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5121/cseij.2022.12106\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Science & Engineering: An International Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5121/cseij.2022.12106","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Design of Security Taxonomy in Requirement Engineering
Non Functional Requirements (NFR) are important in all phases of software development and results in quality of software to be built. It is observed that security requirements are incorporated and identified later in the software development life cycle. Security as non functional requirements imposes new challenges in managing confidential data and preserving its integrity. The security requirements and related artefacts must be considered from Requirement Engineering (RE) phase to implementation phase. This paper focuses on new design of taxonomy of security in Requirement Engineering. The design covers the major properties of security which are required in developing any web based, secured, confidential and integrity oriented system.