Security, Privacy and Trust Oriented Requirements Modeling for Examination System

被引:0
|
作者
Shah, Tejas R.
Patel, S., V
机构
关键词
Requirement engineering; security; privacy; trust; RE stages; online examination system;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The requirement engineering phase of Software Engineering (SE) deals with various activities starting from customer interaction to specifications of the requirements for the designing initiative. Now-a-days security, privacy and trustworthiness have become additional set of crucial requirements in view of the fact that software is vulnerable to various attacks. Many existing paradigms of SE deal with requirements, but less attention has been paid to address the issues of security, privacy and trust implementations. In practice, major attention is given to incorporate security aspects during coding and testing phases. Some paradigms address these issues, but they consider either security or privacy or trust requirements but not all of them together. We believe that security, privacy and trust requirements must be well collected, analyzed and specified through various stages of Requirement Engineering (RE) itself. This paper attempts to model RE activities incorporating security, privacy and trust requirements in effective way during all sub stages of RE phase. The activities of requirements modeling are well detailed and supported with case study of an online examination system of higher education (like University).
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Information and Future Internet Security, Trust and Privacy
    Meng, Weizhi
    Giannetsos, Thanassis
    Jensen, Christian D.
    FUTURE INTERNET, 2022, 14 (12):
  • [32] Security, Privacy and Trust for Responsible Innovations and Governance
    Atluri, Vijay
    Hong, Yuan
    Chun, Soon Ae
    PROCEEDINGS OF THE 21ST ANNUAL INTERNATIONAL CONFERENCE ON DIGITAL GOVERNMENT RESEARCH, DGO 2020, 2020, : 365 - 366
  • [33] Sousveillance Implications for privacy, security, trust, and the law
    Michael, Katina
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2015, 4 (02) : 92 - 94
  • [34] Special Issue Challenges for Security, Privacy and Trust
    Gritzalis, Dimitris
    Lopez, Javier
    COMPUTERS & SECURITY, 2010, 29 (05) : 521 - 522
  • [35] A Survey on Security, Privacy, and Trust in Mobile Crowdsourcing
    Feng, Wei
    Yan, Zheng
    Zhang, Hengrun
    Zeng, Kai
    Xiao, Yu
    Hou, Y. Thomas
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 2971 - 2992
  • [36] A Trust Model for Security and Privacy in Cloud Services
    Himanshu, Gupta
    Afewou, Kodjo Desire
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 443 - 450
  • [37] The hidden meta-requirements of security and privacy
    Spafford, G
    FIFTH IEEE INTERNATIONAL SYMPOSIUM ON REQUIREMENTS ENGINEERING, PROCEEDINGS, 2001, : 10 - 10
  • [38] The Effect of Providing Visualizations in Privacy Policies on Trust in Data Privacy and Security
    Becker, Joerg
    Heddier, Marcel
    Oeksuez, Ayten
    Knackstedt, Ralf
    2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 3224 - 3233
  • [39] Security and Privacy in Video Surveillance: Requirements and Challenges
    Rajpoot, Qasim Mahmood
    Jensen, Christian Damsgaard
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 169 - 184
  • [40] DOES COMPUTER SECURITY MEET PRIVACY REQUIREMENTS
    ELLISON, R
    INFORMATION PRIVACY, 1978, 1 (01): : 33 - 37