Indian Journal of Science and Technology
Year: 2016, Volume: 9, Issue: 29, Pages: 1-5
Parveen Nikhat1*, Nayak Sandeep Kumar1 and M. H. Khan2
1 Department of Computer Application, [email protected]
2 Department of Computer Engineering,[email protected]
*Author for correspondence
Department of Computer Application,
Email: [email protected]
Objectives: The software security and its proper measurement involve various tools and techniques. To make software secure its foundation stone, the requirement, should also be secure and therefore the integrity control for requirement at the same phase became the objective for delivering secure requirement and so forth the software. Method/Analysis: The past research study entails about less secure software deliver by industries and among the major cause of security lacking, one cause is integrity to requirements. Requirement integrity can be observed as trustworthy, complete and veracity requirement for producing secure software. Only conceptual notion of integrity is not capable to make any component secure but it must be depicted in understandable and quantifiable idiom for assessing the better security solution to requirement and therefore to software. Findings: MQIR (Model to quantify integrity) for requirement at requirement phase of software development process is a new assessment technique that tries to satisfy all major constraints regarding secure requirements and so forth for software. To implement this new technique a relevant set of values in terms of input is captured for proper data management from various live projects under going in some software companies of repute. An appropriate quantification of requirement data is also furnished for sufficient checking of security level and its efficiency. The technique has also been validated through capturing online shopping data so that its implications may also be assessed accurately. Novelty/Improvement: As far as the application of this technique (MQIR) is concern, the article emphasis on complete usability of online functioning at its highest level of integrity that maintains security with the boundary conditions of e-commerce.
Keywords: Integrity, Requirement Traits, Security Attributes, Security Estimation and Integrity Model
Subscribe now for latest articles and news.