Please use this identifier to cite or link to this item: http://dspace.dtu.ac.in:8080/jspui/handle/repository/13322
Full metadata record
DC FieldValueLanguage
dc.date.accessioned2011-02-25T05:29:06Z-
dc.date.available2011-02-25T05:29:06Z-
dc.date.issued2008-07-18-
dc.identifier.urihttp://dspace.dtu.ac.in:8080/jspui/handle/repository/13322-
dc.descriptionME THESISen_US
dc.description.abstractRequirements elicitation for a new system requires extensive involvement with stakeholders who usually have varying aims, backgrounds and disciplines, and this process is complicated further if the system has critical security, or other non-functional requirements. Established approaches to the elicitation and analysis of functional and non- functional requirements are very different, the former focusing on boundary behavior and the later on threats to assets. The development of functional requirements focuses on how a system interacts with its environment, while the development of security requirements focuses on risk, in particular the risk of particular unwanted outcomes to the business, and its assets. Functional requirements are clearly behavior-led, whereas security requirements are asset driven. As a consequence these processes are rarely fully combined; security is often dealt after the requirement engineering process. As a result of this the requirement engineer en...en_US
dc.language.isoenen_US
dc.relation.ispartofseriesTD441;67-
dc.subjectENGINEERINGen_US
dc.subjectSECURITYen_US
dc.titleVIEW POINT APPROACH FOR ENGINEERING SECURITY REQUIREMENTSen_US
Appears in Collections:M.E./M.Tech. Computer Technology & Applications

Files in This Item:
File Description SizeFormat 
Ashish+Agarwal+01+cta+06+Thesis++of+ME.pdf452.25 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.