Abstract
Though UML or Unified Modeling Language is a popular language for modeling software requirements, it is mostly useful for functional requirements only and provides limited support for non-functional requirements, like security. In the present scenario when the use of internet-based and cloud-based applications is increasing, such requirements are far more relevant. In this paper Functionality Rank Diagrams are proposed that follow a well-structured requirement elicitation and ranking mechanism, and model these non-functional requirements leading to a better system design.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sommerville, I., Sawyer, P., Viller, S.: Viewpoints for requirements elicitation a practical approach. In: IEEE International Symposium on Requirements Engineering, pp. 74–81 (1998)
Lindvall, M., Basili, V.R., Boehm, B.W., Costa, P., Dangle, K., Shull, F., Tesoriero, R., Williams, L.A., Zelkowitz, M.V.: Empirical findings in Agile methods. In: XP Universe and Agile Universe Conference on Extreme Programming and Agile Methods, 197–207 (2002)
Shreyas, D.: Software engineering for security - towards architecting secure software. In: ICS 221 Seminar in Software Engineering, University of California, Irvine, pp. 1–12 (2001)
Rittinghouse, J.W., Ransome, J.F.: Cloud Computing: Implementation, Management, and Security. CRC Press, Boca Raton (2010)
Goel, R., Govil, M.C., Singh, G.: Imbibing security in software development life cycle: a review paper. In: Afro - Asian International Conference on Science, Engineering and Technology, pp. 593–599 (2015)
Futcher, L., Solms, R.V.: SecSDM: a usable tool to support IT undergraduate students in secure software development. In: HAISA, pp. 86–96 (2012)
Sabahat, N., Iqbal, F., Azam, F., Javed, M.Y.: An iterative approach for global requirements elicitation: a case study analysis. In: International Conference on Electronics and Information Engineering, pp. 361–366 (2010)
Booch, G., Rumbaugh, J., Jacobson, I.: Unified Modeling Language User Guide. Pearson Education India, Bengaluru (2005)
Woods, E.: Harnessing UML for architectural description the context view. IEEE Softw. 31, 30–33 (2014)
Choppy, C., Reggio, G.: Requirements capture and specification for enterprise applications: a UML based attempt. In: Australian Software Engineering Conference, pp. 19–28 (2006)
Konrad, S., Goldsby, H., Lopez, K., Cheng, B.H.C.: Visualizing requirements in UML models. In: International Workshop on Visualization Requirements Engineering, p. 1 (2007)
Chua, B.B., Bernardo, D.V., Verner, J.: Understanding the use of elicitation approaches for effective requirements gathering. In: International Conference on Software Engineering Advances, pp. 325–330 (2010)
Ezzat, E.M., Zanfaly, D.S., Mostafa, M.M.: Fly over clouds or drive through the crowd: a cloud adoption framework. In: International Conference and Workshop on the Current Trends in Information Technology, pp. 6–11 (2011)
Mullery, G.P.: CORE-A method for controlled requirement specification. In: 4th International Conference on Software Engineering, pp. 126–135 (1979)
Kang, K.C., Cohen, S.G., Hess, J.A., Novak, W.E., Peterson, A.S.: Feature-oriented domain analysis (FODA) feasibility study, Carnegie-Mellon University (1990)
Douglas, N., Rittel, H.W.J.: Issue based information system for design. In: Association for Computer Aided Design in Architecture, University of Michigan, pp. 275–286 (1988)
Talukder, A.K., Maurya, V.K., Santhosh, B.G., Jangam, E., Muni, S.V., Jevitha, K.P., Saurabh, S., Pais, A.R.: Security-aware Software Development Life Cycle (SaSDLC)-Processes and tools. In: IFIP International Conferecne on Wireless and Optical Communication Networks, pp. 1–5 (2009)
Jürjens, J.: UMLsec: extending UML for secure systems development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412–425. Springer, Heidelberg (2002)
Kobryn, C.: Experts voice UML 3.0 and the future of modeling. Softw. Syst. Model. 3, 4–8 (2004)
Glinz, M.: Problems and deficiencies of UML as a requirements specification language. In: International Workshop on Software Specification and Design, pp. 11–22 (2000)
Chanda, J., Kanjilal, A., Sengupta, S., Bhattacharya, S.: Traceability of requirements and consistency verification of UML use case, activity and Class diagram: a formal approach. In: International Conference on Methods and Models in Computer Science, pp. 1–4 (2009)
Samuel, B.M., Watkins, L.A., Ehle, A., Khatri, V.: Customizing the representation capabilities of process models: understanding the effects of perceived modeling impediments. IEEE Trans. Softw. Eng. 41, 19–39 (2015)
Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requir. Eng. 10, 34–44 (2005)
Forouzan, B.A.: Data Communications and Networking. McGraw-Hill, New York City (2007)
Pressman, R.S.: Software Engineering a Practitioners Approach. McGraw-Hill, New York City (2001)
Hernndez, U.I., Rodrguez, F.J., Martin, M.V.: Use Processes - Modeling requirements based on elements of BPMN and UML Use Case Diagrams. In: International Conference on Software Technology Engineering, vol. 2, pp. 36–40 (2010)
Santhosh Babu, G., Maurya, V.K., Jangam, E., Muni Sekhar, V., Talukder, A.K., Pais, A.R.: Suraksha: a security designers workbench. In: Hack.in, pp. 59–65 (2009)
Kamata, M.I., Tamai, T.: How does requirements quality relate to project success or failure? In: Requirements Engineering Conference, pp. 69–78 (2007)
Pauli, J.J., Xu, D.: Misuse case-based design and analysis of secure software architecture. In: International Conference on Information Technology Coding and Computer, vol. 2, pp. 2005–2010 (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Goel, R., Govil, M.C., Singh, G. (2016). Modeling Software Security Requirements Through Functionality Rank Diagrams. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2016. ICCSA 2016. Lecture Notes in Computer Science(), vol 9790. Springer, Cham. https://doi.org/10.1007/978-3-319-42092-9_31
Download citation
DOI: https://doi.org/10.1007/978-3-319-42092-9_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-42091-2
Online ISBN: 978-3-319-42092-9
eBook Packages: Computer ScienceComputer Science (R0)