Open Access Open Access  Restricted Access Subscription Access

Model to Quantify Integrity at Requirement Phase


Affiliations
1 Department of Computer Application, Integral University, Kursi Road, Dashauli, Lucknow - 226021, Uttar Pradesh, India
2 Department of Computer Engineering, I.E.T, Sitapur Road, Lucknow - 226021, Uttar Pradesh, India
 

Objectives: The software security and its proper measurement involve various tools and techniques. To make software secure its foundation stone, the requirement, should also be secure and therefore the integrity control for requirement at the same phase became the objective for delivering secure requirement and so forth the software. Method/Analysis: The past research study entails about less secure software deliver by industries and among the major cause of security lacking, one cause is integrity to requirements. Requirement integrity can be observed as trustworthy, complete and veracity requirement for producing secure software. Only conceptual notion of integrity is not capable to make any component secure but it must be depicted in understandable and quantifiable idiom for assessing the better security solution to requirement and therefore to software. Findings: MQIR (Model to quantify integrity) for requirement at requirement phase of software development process is a new assessment technique that tries to satisfy all major constraints regarding secure requirements and so forth for software. To implement this new technique a relevant set of values in terms of input is captured for proper data management from various live projects under going in some software companies of repute. An appropriate quantification of requirement data is also furnished for sufficient checking of security level and its efficiency. The technique has also been validated through capturing online shopping data so that its implications may also be assessed accurately. Novelty/Improvement: As far as the application of this technique (MQIR) is concern, the article emphasis on complete usability of online functioning at its highest level of integrity that maintains security with the boundary conditions of e-commerce.

Keywords

Integrity, Requirement Traits, Security Attributes, Security Estimation and Integrity Model.
User

Abstract Views: 152

PDF Views: 0




  • Model to Quantify Integrity at Requirement Phase

Abstract Views: 152  |  PDF Views: 0

Authors

Parveen Nikhat
Department of Computer Application, Integral University, Kursi Road, Dashauli, Lucknow - 226021, Uttar Pradesh, India
Nayak Sandeep Kumar
Department of Computer Application, Integral University, Kursi Road, Dashauli, Lucknow - 226021, Uttar Pradesh, India
M. H. Khan
Department of Computer Engineering, I.E.T, Sitapur Road, Lucknow - 226021, Uttar Pradesh, India

Abstract


Objectives: The software security and its proper measurement involve various tools and techniques. To make software secure its foundation stone, the requirement, should also be secure and therefore the integrity control for requirement at the same phase became the objective for delivering secure requirement and so forth the software. Method/Analysis: The past research study entails about less secure software deliver by industries and among the major cause of security lacking, one cause is integrity to requirements. Requirement integrity can be observed as trustworthy, complete and veracity requirement for producing secure software. Only conceptual notion of integrity is not capable to make any component secure but it must be depicted in understandable and quantifiable idiom for assessing the better security solution to requirement and therefore to software. Findings: MQIR (Model to quantify integrity) for requirement at requirement phase of software development process is a new assessment technique that tries to satisfy all major constraints regarding secure requirements and so forth for software. To implement this new technique a relevant set of values in terms of input is captured for proper data management from various live projects under going in some software companies of repute. An appropriate quantification of requirement data is also furnished for sufficient checking of security level and its efficiency. The technique has also been validated through capturing online shopping data so that its implications may also be assessed accurately. Novelty/Improvement: As far as the application of this technique (MQIR) is concern, the article emphasis on complete usability of online functioning at its highest level of integrity that maintains security with the boundary conditions of e-commerce.

Keywords


Integrity, Requirement Traits, Security Attributes, Security Estimation and Integrity Model.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i29%2F131262