International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 38 - Issue 8 |
Published: January 2012 |
Authors: Shalini Sharma, Ajit Singh Malik |
![]() |
Shalini Sharma, Ajit Singh Malik . A Novel Framework for Security Requirement Prioritization. International Journal of Computer Applications. 38, 8 (January 2012), 9-14. DOI=10.5120/4706-6868
@article{ 10.5120/4706-6868, author = { Shalini Sharma,Ajit Singh Malik }, title = { A Novel Framework for Security Requirement Prioritization }, journal = { International Journal of Computer Applications }, year = { 2012 }, volume = { 38 }, number = { 8 }, pages = { 9-14 }, doi = { 10.5120/4706-6868 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2012 %A Shalini Sharma %A Ajit Singh Malik %T A Novel Framework for Security Requirement Prioritization%T %J International Journal of Computer Applications %V 38 %N 8 %P 9-14 %R 10.5120/4706-6868 %I Foundation of Computer Science (FCS), NY, USA
Security Requirements prioritization is one of the important Processes in the Software engineering, which aims at identifying and prioritizing the most crucial security requirements for the software project. In order to systematically perform this activity, many approaches have been introduced so far. Despite of the functionalities offered, these techniques have got certain pitfalls imbibed in them such as inefficient and inappropriate requirement gathering prioritization and hike in the specified project budget that leads to degradation in the software quality and security. So there is an imperative need for the efficient solution to overcome them. Thus In this paper, we have proposed a new methodology to prioritize the software security requirements generation process. This methodology improves the security in software applications of the business environment by gathering the properly processed requirements, identifying the vulnerabilities and their corresponding threats. Thus, it leads to the reduction in the estimated budget of the software application along with the security implication.