• Apr 28, 2017 News!Vol.3, No.1 has been published with online version.   [Click]
  • Dec 30, 2016 News!Vol.2, No.4 has been published with online version.   [Click]
  • Jun 22, 2016 News!Vol.2, No.3 has been published with online version.   [Click]
General Information
    • ISSN: 2382-6185
    • Frequency: Quarterly (2015-2016); semiyearly (Since 2017)
    • DOI: 10.18178/IJKE
    • Editor-in-Chief: Prof. Chen-Huei Chou
    • Executive Editor: Ms. Nina Lee
    • Indexed by: Google Scholar, DOAJ, Engineering & Technology Digital Library, Crossref, ProQuest
    • E-mail: ijke@ejournal.net
Editor-in-chief
Prof. Chen-Huei Chou
College of Charleston, SC, USA
It is my honor to be the editor-in-chief of IJKE. I will do my best to help develop this journal better.
IJKE 2015 Vol.1(1): 24-29 ISSN: 2382-6185
DOI: 10.7763/IJKE.2015.V1.4

A Domain Ontology Based Approach to Identify Effect Types of Security Requirements upon Functional Requirements

Bilal Al-Ahmad, Kenneth Magel, and Sameer Abufardeh
Abstract—Inter-requirements traceability refers to finding the relationships between requirements. Several approaches have been identified cooperative, conflicting, and irrelevant relationships between requirements. However, the current solutions have a lack of capturing the syntactic and semantic aspects of requirements, and less attention has been paid to relating security requirements with functional requirements.
To overcome these limitations, we propose to use a domain ontology based approach, in which a domain ontology can be used as a domain knowledge to discover relationships between requirements. Our proposed solution is a hybrid approach which uses: 1) a syntactic parsing technique to decompose the requirements statements into Subject, Verb, and Complement constructs, 2) a domain ontology to create a knowledge repository about security and functional requirements concepts, and 3) a rule based system to build several detection rules that identify security requirements effects upon functional requirements. We evaluate our approach in a case study of requirements for an online medical database system that shows how the effect types can be determined.

Index Terms—Detection rules, domain ontology, effect types, security requirements.

Bilal Al-Ahmad was with Jordan. Now he is with Software Engineering at North Dakota State University, USA (e-mail: bilal.alahmad@ndsu.edu).
Kenneth Magel and Sameer Abufardeh are with North Dakota State University, USA.

[PDF]

Cite: Bilal Al-Ahmad, Kenneth Magel, and Sameer Abufardeh, "A Domain Ontology Based Approach to Identify Effect Types of Security Requirements upon Functional Requirements," International Journal of Knowledge Engineering vol. 1, no. 1, pp. 24-29, 2015.

Copyright © 2008-2016. International Journal of Knowledge Engineering. All rights reserved.
E-mail: ijke@ejournal.net