• No results found

[PDF] Top 20 FUNCTIONAL AND NON-FUNCTIONAL REQUIREMENTS OF SOFTWARE IN INFORMATION SECURITY

Has 10000 "FUNCTIONAL AND NON-FUNCTIONAL REQUIREMENTS OF SOFTWARE IN INFORMATION SECURITY" found on our website. Below are the top 20 most common "FUNCTIONAL AND NON-FUNCTIONAL REQUIREMENTS OF SOFTWARE IN INFORMATION SECURITY".

FUNCTIONAL AND NON-FUNCTIONAL REQUIREMENTS OF SOFTWARE IN INFORMATION SECURITY

FUNCTIONAL AND NON-FUNCTIONAL REQUIREMENTS OF SOFTWARE IN INFORMATION SECURITY

... In terms of inappropriate contact, parents were most worried that their child could become a victim of online grooming (60%); other concerns were that their child could be bullied online by other children (54%) or ... See full document

6

Using the ISO 19761 COSMIC Measurement Standard to Reduce “Information Asymmetry” in Software Development Contracts and Enable Greater Competitiveness

Using the ISO 19761 COSMIC Measurement Standard to Reduce “Information Asymmetry” in Software Development Contracts and Enable Greater Competitiveness

... for software, in addition to functional ...to non functional requirements, such as quality, main- tainability, usability, ...the software characterization mechanism in the ... See full document

8

More on Adding Threat during Software Requirements Elicitation and Prioritization

More on Adding Threat during Software Requirements Elicitation and Prioritization

... of software. The analysis of secure software system based on the system requirements elicited in the form of use case and misuse ...the functional and non functional ... See full document

5

A FIREFLY APPROACH FOR PRIORITIZING FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTS

A FIREFLY APPROACH FOR PRIORITIZING FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTS

... A requirements prioritization scheme named Case-Based Ranking [9] was introduced for requirements ...the software planner’s first choices with the requirements arrangements approximations by ... See full document

5

DEVELOPMENT AND APPLICATION OF A STAGE GATE PROCESS TO REDUCE THE UNERLYING 
RISKS OF IT SERVICE PROJECTS

DEVELOPMENT AND APPLICATION OF A STAGE GATE PROCESS TO REDUCE THE UNERLYING RISKS OF IT SERVICE PROJECTS

... online information sharing and communicating among people, and the sites relate to entertainment, educational and business ...and information of system development among ...relevant functional and ... See full document

11

GOREWEB framework for goal oriented requirements engineering of web applications

GOREWEB framework for goal oriented requirements engineering of web applications

... “non-functional requirements” is used to delineate requirements focusing on “how good” software does something as opposed to the functional requirements, which focus on ... See full document

13

Customisable model transformations based on non functional requirements

Customisable model transformations based on non functional requirements

... between functional alternatives ...on functional requirements, no such support exists for customisation based on non-functional ...a software family will have similar but ... See full document

8

Goal Oriented Requirements Engineering for Non functional Factors

Goal Oriented Requirements Engineering for Non functional Factors

... the Software Development Life Cycle Process. If the requirements have not been captured correctly during the initial elicitation process, then the whole development process will fail and also results in ... See full document

6

Study on Requirement Engineering and Traceability Techniques in Software Artefacts

Study on Requirement Engineering and Traceability Techniques in Software Artefacts

... gives information in ...the information required from attributes that contains ...redundancy. Software Requirements Specification (SRS) describes internal and external behavior of the system ... See full document

8

Impact Analysis of Changes in Functional Requirements in the Behavioral View of Software Architectures

Impact Analysis of Changes in Functional Requirements in the Behavioral View of Software Architectures

... tional requirements of the system, divided into several key abstractions taken from the problem ...the non-functional requirements such as performance and ...the software into small ... See full document

198

Bringing security home: A process for developing secure and usable systems

Bringing security home: A process for developing secure and usable systems

... represent security and usability requirements in the design from the ...for Information Security), a secure software engineering method that integrates security ... See full document

9

Measuring Security Requirements for Software Security

Measuring Security Requirements for Software Security

... FOR SECURITY REQUIREMENTS Security requirements are actually a set of conditions that describe properties such as confidentiality, integrity, availability, authenticity, and ... See full document

6

Issues of Cyber Laws and IPR in Software Industry and Software Process Model

Issues of Cyber Laws and IPR in Software Industry and Software Process Model

... IPR AND CL ISSUES IN REQUIREMENT ANALYSIS As far as non-functional and domain requirements in software development process is concerned lack of knowledge of IPR and CL could drive into c[r] ... See full document

6

Design of Feeder Terminal Communication Based on IEC61850 Standard

Design of Feeder Terminal Communication Based on IEC61850 Standard

... the functional requirements of the distribution ...the functional requirements of the distribution terminal, and the information model of intelligent power distribution terminal is ... See full document

6

Performance Assessment Of An Imperceptible And Robust Secured E-Voting Model

Performance Assessment Of An Imperceptible And Robust Secured E-Voting Model

... integrity security requirements to e-voting systems in ...using information hiding techniques and software engineering process ...social security requirements require for the ... See full document

6

Systematizing security test planning using functional requirements phrases

Systematizing security test planning using functional requirements phrases

... for security by considering the six major categories of threats that a system may encounter: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of ...our ... See full document

11

Desiree - a Refinement Calculus for Requirements Engineering

Desiree - a Refinement Calculus for Requirements Engineering

... for requirements makes several contributions: (1) unlike many formal languages that are able to capture only functional requirements ...and Software Cost Reduction, see a summary and ... See full document

227

A contract-based approach to describe and deploy non-functional adaptations in software architectures

A contract-based approach to describe and deploy non-functional adaptations in software architectures

... The presented use-cases showed us that the com- ponents of the CR-RIO middleware follow a recurrent architectural pattern in those different applications. In particular, in our experiments we observed that the ... See full document

16

Towards the Proper Integration of Extra-Functional Requirements

Towards the Proper Integration of Extra-Functional Requirements

... Although a distinction between functional and extra-functional requirements will be feasible especially in early phases of software development, extra-functional requirements, however, w[r] ... See full document

20

Research Scientific Research Units Management Information System Requirements Analysis by Multi view Requirement Tree

Research Scientific Research Units Management Information System Requirements Analysis by Multi view Requirement Tree

... (3) The ecological construction. Used internet plus service as the main line, utilized ideas of innovation driven, remodeling, open sharing and all connected, provided public management platform, communication platform ... See full document

5

Show all 10000 documents...