Open Access Open Access  Restricted Access Subscription Access

Fuzzy Interference Approach Based Prioritization of Security Requirements


Affiliations
1 KSR College of Engineering, Thiruchengode, Namakkal, Tamil, India
 

Objective: The main objective goal of this work is to analysis and identifies the security requirements on behalf of the software development. Improve and prevent the software development process from the failure by ranking and prioritizing the security requirements based on risk level.

Methodology: The fuzzy interference based approach is introduced to prioritize the security requirements that are more vulnerable to the system. This methods work with the aims of prioritizing the tasks based on the security risk level. The threat with more risk level will be given more priority and that will be concentrated more at the tie software development.

Results: The experimental tests conducted were proves that the proposed methodology can provide the better result than the existing methodology in terms of improvement of well software developmen.

Conclusion: From the findings, it can demonstrated that the proposed methodology is improved in terms of the accuracy.


Keywords

Software Failure, Security Requirements, Fuzzy Model, Prioritization.
User
Notifications

Abstract Views: 279

PDF Views: 0




  • Fuzzy Interference Approach Based Prioritization of Security Requirements

Abstract Views: 279  |  PDF Views: 0

Authors

S. Mithun Brindha
KSR College of Engineering, Thiruchengode, Namakkal, Tamil, India
G. Singaravel
KSR College of Engineering, Thiruchengode, Namakkal, Tamil, India

Abstract


Objective: The main objective goal of this work is to analysis and identifies the security requirements on behalf of the software development. Improve and prevent the software development process from the failure by ranking and prioritizing the security requirements based on risk level.

Methodology: The fuzzy interference based approach is introduced to prioritize the security requirements that are more vulnerable to the system. This methods work with the aims of prioritizing the tasks based on the security risk level. The threat with more risk level will be given more priority and that will be concentrated more at the tie software development.

Results: The experimental tests conducted were proves that the proposed methodology can provide the better result than the existing methodology in terms of improvement of well software developmen.

Conclusion: From the findings, it can demonstrated that the proposed methodology is improved in terms of the accuracy.


Keywords


Software Failure, Security Requirements, Fuzzy Model, Prioritization.