Loading

Optimizing the Impact of Security Attributes in Requirement Elicitation Techniques using FAHP
Virendra Singh1, Dhirendra Pandey2, Kavita Sahu3, Mohd Waris Khan4

1Virendra Singh*, Department of Inforamation Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, Uttar Pradesh, India
2Dhirendra Pandey, Department of Inforamation Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, Uttar Pradesh, India
3Kavita Sahu, Department of Computer Science, Dr Shankutala Misra National Rehabilation University, Lucknow, Uttar Pradesh, India
4Mohd Waris Khan, Department of Inforamation Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, Uttar Pradesh, India
Manuscript received on January 20, 2020. | Revised Manuscript received on February 02, 2020. | Manuscript published on February 10, 2020. | PP: 1656-1661 | Volume-9 Issue-4, February 2020. | Retrieval Number: D1213029420/2020©BEIESP | DOI: 10.35940/ijitee.D1213.029420
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Software security is a key issue in the domain of software engineering which attracts attention from both the industry and academia. Besides, due to the massive investment in software development, security is in much demand. The selection of appropriate software development model is an increasingly challenging task. Security attributes play a vital role while designing security during software development. Each attribute has its importance during requirement elicitation procedure. This is based upon the user’s demand, organization resources, and sensitivity of the information. Hence, developers should understand the significance of each attribute while collecting the user requirements for developing software. In this paper, authors have proposed an approach for prioritization of these attributes using the Fuzzy Analytic Hierarchy Process (Fuzzy AHP) method. A literature survey reveals that critical security attributes such as Integrity, confidentiality, Authentication, Effectiveness, Availability, Access Control and Authorization. This will help developers to improve software security for longer. 
Keywords: Software Security, Priority Assessment, Fuzzy Analytic Hierarchy Process, Security Requirements, Security Factors
Scope of the Article: Fuzzy logics