Security, Privacy and Trust Oriented Requirements Modeling for Examination System

被引:0
|
作者
Shah, Tejas R.
Patel, S., V
机构
关键词
Requirement engineering; security; privacy; trust; RE stages; online examination system;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The requirement engineering phase of Software Engineering (SE) deals with various activities starting from customer interaction to specifications of the requirements for the designing initiative. Now-a-days security, privacy and trustworthiness have become additional set of crucial requirements in view of the fact that software is vulnerable to various attacks. Many existing paradigms of SE deal with requirements, but less attention has been paid to address the issues of security, privacy and trust implementations. In practice, major attention is given to incorporate security aspects during coding and testing phases. Some paradigms address these issues, but they consider either security or privacy or trust requirements but not all of them together. We believe that security, privacy and trust requirements must be well collected, analyzed and specified through various stages of Requirement Engineering (RE) itself. This paper attempts to model RE activities incorporating security, privacy and trust requirements in effective way during all sub stages of RE phase. The activities of requirements modeling are well detailed and supported with case study of an online examination system of higher education (like University).
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Privacy, Security, Soft Requirements, and Flaky Tests
    Staron, Miroslaw
    Abrahao, Silvia
    Honnenahalli, Chetan
    Horkoff, Jennifer
    IEEE SOFTWARE, 2023, 40 (05) : 117 - 120
  • [42] Analyzing regulatory rules for privacy and security requirements
    Breaux, Travis D.
    Anton, Annie I.
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2008, 34 (01) : 5 - 20
  • [43] Security and Privacy Requirements for the Internet of Things: A Survey
    Alhirabi, Nada
    Rana, Omer
    Perera, Charith
    ACM TRANSACTIONS ON INTERNET OF THINGS, 2021, 2 (01):
  • [44] Trust and Privacy Solutions Based on Holistic Service Requirements
    Sanchez Alcon, Jose Antonio
    Lopez, Lourdes
    Martinez, Jose-Fernan
    Rubio Cifuentes, Gregorio
    SENSORS, 2016, 16 (01):
  • [45] The effect of trust assumptions on the elaboration of security requirements
    Haley, CB
    Laney, RC
    Moffett, JD
    Nuseibeh, B
    12TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, PROCEEDINGS, 2004, : 102 - 111
  • [46] Modeling security requirements for cloud-based system development
    Ficco, Massimo
    Palmieri, Francesco
    Castiglione, Aniello
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08): : 2107 - 2124
  • [47] An implementation of a unified security, trust and privacy (STP) framework for future integrated RFID system
    Mubarak, Mohd Faizal
    Ab Manan, Jamalul-Lail
    Yahya, Saadiah
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8860 : 122 - 135
  • [48] Next Generation Cloud Computing: Security, Privacy and Trust Issues from the System View
    Bester, Ron
    Khan, M. Arif
    2021 18TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (JCSSE-2021), 2021,
  • [49] An Implementation of a Unified Security, Trust and Privacy (STP) Framework for Future Integrated RFID System
    Mubarak, Mohd Faizal
    Ab Manan, Jamalul-Lail
    Yahya, Saadiah
    FUTURE DATA AND SECURITY ENGINEERING, FDSE 2014, 2014, 8860 : 122 - 135
  • [50] Security and trust in agent-oriented middleware
    Poggi, A
    Tomaiuolo, M
    Vitaglione, G
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2003: OTM 2003 WORKSHOPS, 2003, 2889 : 989 - 1003