Please use this identifier to cite or link to this item: http://dspace.dtu.ac.in:8080/jspui/handle/repository/14316
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSoni, Krishna Chandra-
dc.date.accessioned2015-05-14T11:53:16Z-
dc.date.available2015-05-14T11:53:16Z-
dc.identifier.urihttp://dspace.dtu.ac.in:8080/jspui/handle/repository/14316-
dc.description.abstractCurrent practices for developing secure information systems are still closer to art than to an engineering discipline. Security is still treated as an add-on and is therefore not integrated into software development practices and tools. Experienced security artisans are still the key to achieving acceptable levels of security. Security of software system means protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications). Many methods have been proposed for framing the security requirements, but the main target is how to find the solutions fulfilling these security requirements, to produce complete secure information system. So, we propose a Model framework for finding a complete solutions of security requirements, which are identified during the security requirement elicitation stage, using back tracking analysis. After gathering security requirements, we do back tracking analysis of the approaches used to gather security requirements, to identify the solutions necessary to fulfill the gathered security requirements. On basis of back tracking analysis, we will find conceptual solutions and security services and corresponding mechanisms which encompass the complete security of software system.en_US
dc.description.sponsorshipShalender Kumar Vermaen_US
dc.language.isoenen_US
dc.relation.ispartofseriesTD-932;-
dc.subjectInformation System, Integrity, Availability, Confidentiality, Security Requirement Elicitation, Backtracking, Conceptual Solutions, Security Services, Security Mechanismsen_US
dc.titleDesigning Security Requirement Solutions Using Back Tracking Approachen_US
dc.typeThesisen_US
Appears in Collections:M.E./M.Tech. Computer Engineering

Files in This Item:
File Description SizeFormat 
final thesis.pdf2.2 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.