International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-1  ( Jan, 2024 )
Past issues
  1. Volume-11,Issue-12  ( Dec, 2023 )
  2. Volume-11,Issue-11  ( Nov, 2023 )
  3. Volume-11,Issue-10  ( Oct, 2023 )
  4. Volume-11,Issue-9  ( Sep, 2023 )
  5. Volume-11,Issue-8  ( Aug, 2023 )
  6. Volume-11,Issue-7  ( Jul, 2023 )
  7. Volume-11,Issue-6  ( Jun, 2023 )
  8. Volume-11,Issue-5  ( May, 2023 )
  9. Volume-11,Issue-4  ( Apr, 2023 )
  10. Volume-11,Issue-3  ( Mar, 2023 )

Statistics report
Apr. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 133
Paper Published : 1552
No. of Authors : 4025
  Journal Paper


Paper Title :
Bridging The Gap Between Requirement And Security Through Secure Requirement Specification Checklist

Author :Nikhat Parveen, Md. Rizwan Beg, M. H. Khan

Article Citation :Nikhat Parveen ,Md. Rizwan Beg ,M. H. Khan , (2015 ) " Bridging The Gap Between Requirement And Security Through Secure Requirement Specification Checklist " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 25-29, Volume-3, Issue-2

Abstract : Requirement phase of the software development is the most appropriate and early stage for incorporating security. Unfortunately, no efficient methodology or tool exists to address security at requirement phase. Almost negligible work has been reported to assess the impact of security at requirement phase. Traditionally, security is often an afterthought but it is necessary that security should begin at the requirement level which covers both functional security as well as its emergent characteristics. Hence, it is important to identify security requirements of the system. In this paper, we propose a checklist for security requirement and assess the security with the help of mapping requirement parameters and security attributes. The total weight of security requirement is calculated with the DSR value and placed in security requirement traceability matrix. Keywords- Software Security, Security Requirement, Confidentiality, Integrity, Availability, Authentication, Non-Repudiation and Access Control

Type : Research paper

Published : Volume-3, Issue-2


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1676   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 92
| Published on 2015-01-30
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY