Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
Towards Capturing Security Requirements in Agile Software Development
Author(s):
1. W. Ahmed: University Institute of Information Technology, Pir Mehr Ali Shah Arid Agriculture University, Rawalpindi, Pakistan
2. Y. Hafeez: University Institute of Information Technology, Pir Mehr Ali Shah Arid Agriculture University, Rawalpindi, Pakistan
3. G. Chiurlea: University of Wolverhampton, Wolverhampton, U.K
Abstract:
Software use is an unavoidable reality. Increased use expands the opportunity for malicious use which threatens security and privacy. There are many factors like data loss, increase in budget cost due to security breaches, pending legislation and competitive advantage are driving software developers to integrate security into software development rather than adding security in later stages of development. The approach presented here addresses elicitation, prioritization, analysis of requirements and security requirements. This can be done by identifying candidate's security goals, their categorization and understanding with stakeholders to develop preliminary security requirements and then prioritization and at the end security requirements are output.
Page(s): 164-172
DOI: DOI not available
Published: Journal: Nucleus, Volume: 54, Issue: 3, Year: 2017
Keywords:
IPTFN , IIPTFOWA operator , MAGDM problem , IIPTFHA operator
References:
References are not available for this document.
Citations
Citations are not available for this document.
0

Citations

0

Downloads

20

Views