The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objectives: The software security and its proper measurement involve various tools and techniques. To make software secure its foundation stone, the requirement, should also be secure and therefore the integrity control for requirement at the same phase became the objective for delivering secure requirement and so forth the software. Method/Analysis: The past research study entails about less secure software deliver by industries and among the major cause of security lacking, one cause is integrity to requirements. Requirement integrity can be observed as trustworthy, complete and veracity requirement for producing secure software. Only conceptual notion of integrity is not capable to make any component secure but it must be depicted in understandable and quantifiable idiom for assessing the better security solution to requirement and therefore to software. Findings: MQIR (Model to quantify integrity) for requirement at requirement phase of software development process is a new assessment technique that tries to satisfy all major constraints regarding secure requirements and so forth for software. To implement this new technique a relevant set of values in terms of input is captured for proper data management from various live projects under going in some software companies of repute. An appropriate quantification of requirement data is also furnished for sufficient checking of security level and its efficiency. The technique has also been validated through capturing online shopping data so that its implications may also be assessed accurately. Novelty/Improvement: As far as the application of this technique (MQIR) is concern, the article emphasis on complete usability of online functioning at its highest level of integrity that maintains security with the boundary conditions of e-commerce.

Keywords

Integrity, Requirement Traits, Security Attributes, Security Estimation and Integrity Model.
User