z-logo
open-access-imgOpen Access
A novel intelligent model for classify and evaluating non-functional security requirements form scenarios
Author(s) -
Akram Abdelqader
Publication year - 2019
Publication title -
indonesian journal of electrical engineering and computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.241
H-Index - 17
eISSN - 2502-4760
pISSN - 2502-4752
DOI - 10.11591/ijeecs.v15.i3.pp1578-1585
Subject(s) - functional requirement , computer science , computer security model , security testing , rss , requirements analysis , set (abstract data type) , security information and event management , non functional testing , support vector machine , process (computing) , non functional requirement , computer security , software , data mining , cloud computing security , software engineering , requirements management , software system , machine learning , cloud computing , world wide web , software construction , programming language , operating system
Software requirements with its functional and non-functional methods are the first important phase in producing a software system with free errors. The functional requirements are the visual actions that may easily evaluated from the developer and from the user, but non-functional requirements are not visual and need a lot of efforts to be evaluated. One of the main important non-functional requirements is security, which focuses on generating secure systems from strangers. Evaluating the security of the system in earlier steps will help to reduce the efforts of reveals critical system threats. Security threats found because of leaking of security scenarios in requirement phase. In this paper, we purpose an intelligent model to extract and evaluate security features from scenarios based on set of security system goals and a set of security requirements saved on rich story scenarios dataset (RSSD). This model will used a support vector machine (SVM) classifier to classify the security requirement based on RSS dataset.  The using of SVM will enhance the overall process of evaluating the security requirements. The results show a significant enhancement in security improvements.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here