Security, Privacy and Trust Oriented Requirements Modeling for Examination System

被引:0
|
作者
Shah, Tejas R.
Patel, S., V
机构
关键词
Requirement engineering; security; privacy; trust; RE stages; online examination system;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The requirement engineering phase of Software Engineering (SE) deals with various activities starting from customer interaction to specifications of the requirements for the designing initiative. Now-a-days security, privacy and trustworthiness have become additional set of crucial requirements in view of the fact that software is vulnerable to various attacks. Many existing paradigms of SE deal with requirements, but less attention has been paid to address the issues of security, privacy and trust implementations. In practice, major attention is given to incorporate security aspects during coding and testing phases. Some paradigms address these issues, but they consider either security or privacy or trust requirements but not all of them together. We believe that security, privacy and trust requirements must be well collected, analyzed and specified through various stages of Requirement Engineering (RE) itself. This paper attempts to model RE activities incorporating security, privacy and trust requirements in effective way during all sub stages of RE phase. The activities of requirements modeling are well detailed and supported with case study of an online examination system of higher education (like University).
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Requirements for Security, Privacy, and Trust in the Internet of Things
    Mohammed, Sabah
    Kim, Tai-Hoon
    Fang, Wai Chi
    IEEE SECURITY & PRIVACY, 2021, 19 (01) : 8 - 10
  • [2] Trust, privacy and security in e-business: Requirements and solutions
    Katsikas, SK
    Lopez, J
    Pernul, G
    ADVANCES IN INFORMATICS, PROCEEDINGS, 2005, 3746 : 548 - 558
  • [3] Specifying Privacy Requirements with Goal-Oriented Modeling Languages
    Peixoto, Mariana Maia
    Silva, Carla
    SBES'18: PROCEEDINGS OF THE XXXII BRAZILIAN SYMPOSIUM ON SOFTWARE ENGINEERING, 2018, : 112 - 121
  • [4] Datalog for Security, Privacy and Trust
    Bonatti, Piero A.
    DATALOG RELOADED: FIRST INTERNATIONALWORKSHOP, DATALOG 2010, 2011, 6702 : 21 - 36
  • [5] A Unified Model for Security, Trust and Privacy (STP) of RFID System
    Mubarak, Mohd Faizal
    Ab Manan, Jamalul-lail
    Yahya, Saadiah
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2012, 7 (03): : 119 - 126
  • [6] Modeling Security and Privacy Requirements: a Use Case-Driven Approach
    Mai, Phu X.
    Goknil, Arda
    Shar, Lwin Khin
    Pastore, Fabrizio
    Briand, Lionel C.
    Shaame, Shaban
    INFORMATION AND SOFTWARE TECHNOLOGY, 2018, 100 : 165 - 182
  • [7] Security and trust requirements engineering
    Giorgini, P
    Massacci, F
    Zannone, N
    FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 237 - 272
  • [8] Applying Acceptance Requirements to Requirements Modeling Tools via Gamification: A Case Study on Privacy and Security
    Piras, Luca
    Calabrese, Federico
    Giorgini, Paolo
    PRACTICE OF ENTERPRISE MODELING, POEM 2020, 2020, 400 : 366 - 376
  • [9] Privacy, Security and Trust in the Internet of Neurons
    Sempreboni, Diego
    Vigano, Luca
    SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST, STAST 2020, 2021, 12812 : 191 - 205
  • [10] Trust, privacy and security in digital business
    Katsikas, SK
    Lopez, J
    Pernul, G
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2005, 20 (06): : 391 - 399