Please use this identifier to cite or link to this item:
http://dspace.dtu.ac.in:8080/jspui/handle/repository/13322
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.date.accessioned | 2011-02-25T05:29:06Z | - |
dc.date.available | 2011-02-25T05:29:06Z | - |
dc.date.issued | 2008-07-18 | - |
dc.identifier.uri | http://dspace.dtu.ac.in:8080/jspui/handle/repository/13322 | - |
dc.description | ME THESIS | en_US |
dc.description.abstract | Requirements elicitation for a new system requires extensive involvement with stakeholders who usually have varying aims, backgrounds and disciplines, and this process is complicated further if the system has critical security, or other non-functional requirements. Established approaches to the elicitation and analysis of functional and non- functional requirements are very different, the former focusing on boundary behavior and the later on threats to assets. The development of functional requirements focuses on how a system interacts with its environment, while the development of security requirements focuses on risk, in particular the risk of particular unwanted outcomes to the business, and its assets. Functional requirements are clearly behavior-led, whereas security requirements are asset driven. As a consequence these processes are rarely fully combined; security is often dealt after the requirement engineering process. As a result of this the requirement engineer en... | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartofseries | TD441;67 | - |
dc.subject | ENGINEERING | en_US |
dc.subject | SECURITY | en_US |
dc.title | VIEW POINT APPROACH FOR ENGINEERING SECURITY REQUIREMENTS | en_US |
Appears in Collections: | M.E./M.Tech. Computer Technology & Applications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Ashish+Agarwal+01+cta+06+Thesis++of+ME.pdf | 452.25 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.