Ahmad, J and Mohammad, CW and Sadiq, M (2021) Identification of security requirements from the selected set of requirements under fuzzy environment. In: 2021 IEEE International Conference on Computing, Communication, and Intelligent Systems, ICCCIS 2021, 19-20 Feb 2020, Greater Noida, pp. 58-63.
PDF
icccis_2021.pdf - Published Version Restricted to Registered users only Download (3MB) | Request a copy |
Abstract
The elicitation of software requirements is an essential activity of requirement engineering whose task is to collect, gather, or identity the stakeholders requirements. The requirements elicited are of various types like performance requirements, testing requirements, system requirements, functional requirements, etc. according to the need of the stakeholders. Among all the requirements, security requirements play a crucial role to safeguard valuable information from unauthorized users in an organization. In our review process, we found that security requirements elicitation methods lack in answering that how to gather the security requirements from the selected set of functional requirements when stakeholders take part in decision making process and preferences of the software requirements are specified by the use of linguistic variables. Therefore, in order to tackle this problem, in this paper, for the selection of security requirements we propose a fuzzy-based method, so that identification, authentication, and authorization of security requirements can be elicited only for those requirements which are important according to the security point of view. The applicability of the proposed method is discussed by means of an example. © 2021 IEEE.
Item Type: | Conference Paper |
---|---|
Publication: | Proceedings - IEEE 2021 International Conference on Computing, Communication, and Intelligent Systems, ICCCIS 2021 |
Publisher: | Institute of Electrical and Electronics Engineers Inc. |
Additional Information: | The copyright for this article belongs to Institute of Electrical and Electronics Engineers Inc. |
Keywords: | Authentication; Decision making; Intelligent systems; Requirements engineering, Decision making process; Functional requirement; Linguistic variable; Performance requirements; Requirement engineering; Security requirements; Software requirements; Testing requirements, Cryptography |
Department/Centre: | Division of Electrical Sciences > Computer Science & Automation |
Date Deposited: | 10 Aug 2021 09:35 |
Last Modified: | 10 Aug 2021 09:35 |
URI: | http://eprints.iisc.ac.in/id/eprint/69120 |
Actions (login required)
View Item |