Combining IID with BDD to Enhance the Critical Quality of Security Functional Requirements

Sen-Tarng Lai, Fang-Yie Leu, W. Chu
{"title":"Combining IID with BDD to Enhance the Critical Quality of Security Functional Requirements","authors":"Sen-Tarng Lai, Fang-Yie Leu, W. Chu","doi":"10.1109/BWCCA.2014.78","DOIUrl":null,"url":null,"abstract":"In software system, functional requirements are primary system requirements. Client cannot explicitly depicted security requirements and the development team is hard to understand security requirements, makes security requirements difficult to specific implant software system. In software system development process, security requirements often neglected and ignored. However, the cost of correcting security flaws in maintenance phase is over 100 times in requirements phase. Can't effectively improve the system security, enterprises loss is bound to continue to expand. In order to enhance the security of software system, this paper combines the popular software development methodology IID (Interactive and Incremental Development) with BDD (Behavior Driven Development), institutionalized requires functional requirements must be integrated into security requirements. And, using BDD process features to evaluate the major quality of security functional requirements. Timely identifies and modifies the quality defects of security functional requirements item, effectively enhance the security of software systems.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BWCCA.2014.78","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

Abstract

In software system, functional requirements are primary system requirements. Client cannot explicitly depicted security requirements and the development team is hard to understand security requirements, makes security requirements difficult to specific implant software system. In software system development process, security requirements often neglected and ignored. However, the cost of correcting security flaws in maintenance phase is over 100 times in requirements phase. Can't effectively improve the system security, enterprises loss is bound to continue to expand. In order to enhance the security of software system, this paper combines the popular software development methodology IID (Interactive and Incremental Development) with BDD (Behavior Driven Development), institutionalized requires functional requirements must be integrated into security requirements. And, using BDD process features to evaluate the major quality of security functional requirements. Timely identifies and modifies the quality defects of security functional requirements item, effectively enhance the security of software systems.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
IID与BDD相结合,提高安全功能需求的关键质量
在软件系统中,功能需求是主要的系统需求。客户端无法明确描述安全需求,开发团队难以理解安全需求,使得安全需求难以具体植入软件系统。在软件系统开发过程中,安全需求往往被忽视和忽视。然而,在维护阶段纠正安全缺陷的成本是需求阶段的100倍以上。不能有效提高系统的安全性,企业的损失势必会不断扩大。为了提高软件系统的安全性,本文将流行的软件开发方法IID(交互式增量开发)与BDD(行为驱动开发)相结合,制度化地要求功能需求必须集成到安全性需求中。并且,使用BDD过程特性来评估安全功能需求的主要质量。及时识别和修改安全功能需求项的质量缺陷,有效提升软件系统的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Propagation Constant Measurement in Two Dimensional Post Array Waveguide with Triangular Lattice by Metallic Pillars Optical Ray Tracing Based on Dijkstra Algorithm in Inhomogeneous Medium Volunteer Sensor Networks Node Availability Prediction via Stronger Intelligent Selection Optimization Algorithm Co-CEStat: Cooperative Critical Data Transmission in Emergency in Static Wireless Body Area Network User Location Anonymization Based on Secret Computation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1