Skip to main content

Modeling Software Security Requirements Through Functionality Rank Diagrams

  • Conference paper
  • First Online:
Computational Science and Its Applications – ICCSA 2016 (ICCSA 2016)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9790))

Included in the following conference series:

  • 1500 Accesses

Abstract

Though UML or Unified Modeling Language is a popular language for modeling software requirements, it is mostly useful for functional requirements only and provides limited support for non-functional requirements, like security. In the present scenario when the use of internet-based and cloud-based applications is increasing, such requirements are far more relevant. In this paper Functionality Rank Diagrams are proposed that follow a well-structured requirement elicitation and ranking mechanism, and model these non-functional requirements leading to a better system design.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sommerville, I., Sawyer, P., Viller, S.: Viewpoints for requirements elicitation a practical approach. In: IEEE International Symposium on Requirements Engineering, pp. 74–81 (1998)

    Google Scholar 

  2. Lindvall, M., Basili, V.R., Boehm, B.W., Costa, P., Dangle, K., Shull, F., Tesoriero, R., Williams, L.A., Zelkowitz, M.V.: Empirical findings in Agile methods. In: XP Universe and Agile Universe Conference on Extreme Programming and Agile Methods, 197–207 (2002)

    Google Scholar 

  3. Shreyas, D.: Software engineering for security - towards architecting secure software. In: ICS 221 Seminar in Software Engineering, University of California, Irvine, pp. 1–12 (2001)

    Google Scholar 

  4. Rittinghouse, J.W., Ransome, J.F.: Cloud Computing: Implementation, Management, and Security. CRC Press, Boca Raton (2010)

    Google Scholar 

  5. Goel, R., Govil, M.C., Singh, G.: Imbibing security in software development life cycle: a review paper. In: Afro - Asian International Conference on Science, Engineering and Technology, pp. 593–599 (2015)

    Google Scholar 

  6. Futcher, L., Solms, R.V.: SecSDM: a usable tool to support IT undergraduate students in secure software development. In: HAISA, pp. 86–96 (2012)

    Google Scholar 

  7. Sabahat, N., Iqbal, F., Azam, F., Javed, M.Y.: An iterative approach for global requirements elicitation: a case study analysis. In: International Conference on Electronics and Information Engineering, pp. 361–366 (2010)

    Google Scholar 

  8. Booch, G., Rumbaugh, J., Jacobson, I.: Unified Modeling Language User Guide. Pearson Education India, Bengaluru (2005)

    Google Scholar 

  9. Woods, E.: Harnessing UML for architectural description the context view. IEEE Softw. 31, 30–33 (2014)

    Article  Google Scholar 

  10. Choppy, C., Reggio, G.: Requirements capture and specification for enterprise applications: a UML based attempt. In: Australian Software Engineering Conference, pp. 19–28 (2006)

    Google Scholar 

  11. Konrad, S., Goldsby, H., Lopez, K., Cheng, B.H.C.: Visualizing requirements in UML models. In: International Workshop on Visualization Requirements Engineering, p. 1 (2007)

    Google Scholar 

  12. Chua, B.B., Bernardo, D.V., Verner, J.: Understanding the use of elicitation approaches for effective requirements gathering. In: International Conference on Software Engineering Advances, pp. 325–330 (2010)

    Google Scholar 

  13. Ezzat, E.M., Zanfaly, D.S., Mostafa, M.M.: Fly over clouds or drive through the crowd: a cloud adoption framework. In: International Conference and Workshop on the Current Trends in Information Technology, pp. 6–11 (2011)

    Google Scholar 

  14. Mullery, G.P.: CORE-A method for controlled requirement specification. In: 4th International Conference on Software Engineering, pp. 126–135 (1979)

    Google Scholar 

  15. Kang, K.C., Cohen, S.G., Hess, J.A., Novak, W.E., Peterson, A.S.: Feature-oriented domain analysis (FODA) feasibility study, Carnegie-Mellon University (1990)

    Google Scholar 

  16. Douglas, N., Rittel, H.W.J.: Issue based information system for design. In: Association for Computer Aided Design in Architecture, University of Michigan, pp. 275–286 (1988)

    Google Scholar 

  17. Talukder, A.K., Maurya, V.K., Santhosh, B.G., Jangam, E., Muni, S.V., Jevitha, K.P., Saurabh, S., Pais, A.R.: Security-aware Software Development Life Cycle (SaSDLC)-Processes and tools. In: IFIP International Conferecne on Wireless and Optical Communication Networks, pp. 1–5 (2009)

    Google Scholar 

  18. Jürjens, J.: UMLsec: extending UML for secure systems development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412–425. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  19. Kobryn, C.: Experts voice UML 3.0 and the future of modeling. Softw. Syst. Model. 3, 4–8 (2004)

    Article  Google Scholar 

  20. Glinz, M.: Problems and deficiencies of UML as a requirements specification language. In: International Workshop on Software Specification and Design, pp. 11–22 (2000)

    Google Scholar 

  21. Chanda, J., Kanjilal, A., Sengupta, S., Bhattacharya, S.: Traceability of requirements and consistency verification of UML use case, activity and Class diagram: a formal approach. In: International Conference on Methods and Models in Computer Science, pp. 1–4 (2009)

    Google Scholar 

  22. Samuel, B.M., Watkins, L.A., Ehle, A., Khatri, V.: Customizing the representation capabilities of process models: understanding the effects of perceived modeling impediments. IEEE Trans. Softw. Eng. 41, 19–39 (2015)

    Article  Google Scholar 

  23. Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requir. Eng. 10, 34–44 (2005)

    Article  Google Scholar 

  24. Forouzan, B.A.: Data Communications and Networking. McGraw-Hill, New York City (2007)

    MATH  Google Scholar 

  25. Pressman, R.S.: Software Engineering a Practitioners Approach. McGraw-Hill, New York City (2001)

    Google Scholar 

  26. Hernndez, U.I., Rodrguez, F.J., Martin, M.V.: Use Processes - Modeling requirements based on elements of BPMN and UML Use Case Diagrams. In: International Conference on Software Technology Engineering, vol. 2, pp. 36–40 (2010)

    Google Scholar 

  27. Santhosh Babu, G., Maurya, V.K., Jangam, E., Muni Sekhar, V., Talukder, A.K., Pais, A.R.: Suraksha: a security designers workbench. In: Hack.in, pp. 59–65 (2009)

    Google Scholar 

  28. Kamata, M.I., Tamai, T.: How does requirements quality relate to project success or failure? In: Requirements Engineering Conference, pp. 69–78 (2007)

    Google Scholar 

  29. Pauli, J.J., Xu, D.: Misuse case-based design and analysis of secure software architecture. In: International Conference on Information Technology Coding and Computer, vol. 2, pp. 2005–2010 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajat Goel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Goel, R., Govil, M.C., Singh, G. (2016). Modeling Software Security Requirements Through Functionality Rank Diagrams. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2016. ICCSA 2016. Lecture Notes in Computer Science(), vol 9790. Springer, Cham. https://doi.org/10.1007/978-3-319-42092-9_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-42092-9_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-42091-2

  • Online ISBN: 978-3-319-42092-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics