Tag Archives: Md. Mijanur Rahman

A Survey on Security Requirements Elicitation and Presentation in Requirements Engineering Phase

Md. Alamgir Kabir,
Software Engineering
Daffodil International University
Md. Mijanur Rahman
Software Engineering,
Daffodil International University

cardura cialis super viagra pro Abstract: 

Secure software development is the new attention of current world in recent days. Security is the key issue for assuring the quality full software. Since, security is one the non-functional requirement most of the times it is ignored in the requirements phase. But, it is possible to reduce software development cost and time to identify user security requirement in the early stage of the software development process. IT security must apply to ensure the reliable system and protect assets of the business organization. In this scene, the main deal is to present the user security requirements combining with user functional requirements which are collected form requirement phase in Software Development Life Cycle (SDLC). Secure Software Development Life Cycle (SSDLC) start from security requirements. If we can elicit user security requirements and present these requirements in requirements phase then secure software develop will be ensure from the very beginning. In industry and academic, there are several methods to elicit and analyze the user security requirements, but few methods are efficient for identifying and presenting the user security requirements. This paper reflects the current research on software user security requirements elicitation techniques in requirements engineering phase. We try to identify the research trend, based on related published work.

For details please see the attached file:

Thorny Issues of Stakeholder Identification and Prioritization in Requirement Engineering Process

Shariful Islam Majumdar,
Software Engineering,
Daffodil International University
Md. Saidur Rahman,
Software Engineering,
Daffodil International University
Md. Mijanur Rahman
Software Engineering,
Daffodil International University

Abstract:

Identifying the stakeholder in requirement engineering process is one of the critical issues. It performs a remarkable part for successful project completion. The software project largely depends on several stakeholders. Stakeholder identification and prioritization is still a challenging part in the software development life cycle. Most of the time, the stakeholders are treated with less importance during the software deployment. Additionally, there is a lack of attempt to think about the right project stakeholder by the development team. In maximum cases, the stakeholder identification technique is performed incorrectly and there is a lack of attempt to mark out them with priority. Besides, there are so many limitations on the existing processes which are used for identifying stakeholders and setting their priority. These limitations pose a negative impact on the development of software project, which should be pointed out by giving deep concern on it. We are aiming to focus on this typical fact, so that we can figure out the actual problem and current work on identifying stakeholders and setting their priority.

For details please see the attached file:

Model for Identifying the Security of a System: A Case Study of Point Of Sale System

Md. Alamgir Kabir Sagar,
Software Engineering,
Daffodil International University
Md. Mijanur Rahman,
Software Engineering,
Daffodil International University
Md. Ismail Jabiullah
Computer Science and Engineering,
Hamdard University Bangladesh,

real cialis commercial Abstract:

In the competitive economic market the demand of secured and reliable system is increasing day by day. A successful system development is possible by consider equally both functional and nonfunctional requirement. But practically nonfunctional requirements are not identifying as like functional requirement. There are few generic requirements for a system like auditability, extensibility, maintainability, performance, portability, reliability, security, testability, usability and etc. among them security is very vital issue for system development. The security of web based application is vulnerable now a days. For this reason the importance of web based application security is growing over the time. Very often the system fails because of without incorporating the appropriate security specific-process. Our proposed model elicits the system security in a systematic way during requirement analysis phase. Using use case and questionnaires table our model elicits the security requirements of a system. We use Point of Sale System as a case study to identify its security.

For details please see the attached file:

Adapting Social Network to Make Effective Class Room Learning: A Case Study Facebook

Md. Mijanur Rahman,
Software Engineering,
Daffodil International University
Kazi Imdadul Islam,
Software Engineering,
Daffodil International University
Tapushe Rubaya Toma
Software Engineering,
Daffodil International University

Abstract:

Social networks are most important part of our daily life. It makes our life easy in the area of entertainment, communication, business, education and etc. Social network, like Facebook is an indefeasible part of life among the social network based people. This place opens an outer world before them where they are comfort to move over it. It is a platform where everybody can access without any hesitation. Most of the user of the Facbook is students and they are spending lot of time in Facebook. Even more number of people login many times in Facebook with their willingness and different purpose. In this context we can use Facbook to make their study interactive and interesting. At the same time, in traditional class-room learning, students become bore to attend the same style teacher’s lecture. If we can able to use social network as a supported tool of education, we may make effective our classroom education for young generation in continuous learning process.In this paper, we will try to show the path through which the networking will becomes an educational tool and the students may able to go outsides off their bookies knowledge.

For details please see the attached file:

Elicitation and Modeling Non-Functional Requirements – A POS Case Study

Md. Mijanur Rahman ,
Member IACSIT
Shamim Ripon,
Member IACSIT
Proper management of requirements is crucial to successful development software within limited time and cost. Nonfunctional requirements (NFR) are one of the key criteria to derive a comparison among various software systems. In most of software development NFR have be specified as an additional requirement of software. NFRs such as performance, reliability,
maintainability, security, accuracy etc. have to be considered at the early stage of software development as functional requirement (FR). However, identifying NFR is not an easy task. Although there are well developed techniques for eliciting functional requirement, there is a lack of elicitation mechanism for NFR and there is no proper consensus regarding NFR elicitation techniques. Eliciting NFRs are considered to be one of the challenging jobs in requirement analysis. This paper proposes a UML use case based questionary approach to identifying and classifying NFR of a system. The proposed approach is illustrated by using a Point of Sale (POS) case study.
For details please see the attached file:

Stakeholder Prioritization in Requirement Engineering Process: A Case Study on School Management System

go site Author
Shariful Islam Majumdar,
Software Engineering,
Daffodil International University
Md. Saidur Rahman,
Software Engineering,
Daffodil International University
Md. Mijanur Rahman
Software Engineering,
Daffodil International University

go Abstract

Requirement elicitation is one of significant part of software engineering activity. It is very difficult to develop successful software without involvement of the quality stakeholder from the client side. Stakeholder prioritization is one of the indispensable processes in requirements engineering. When a project commences, there might be many stakeholders but minority of them would be the key person to collect software requirement. Now the question is among the stakeholder whose requirement is got the priority and based on what. After identifying the all stakeholders for a specific system, they may be prioritized in a convenient way which is stakeholder prioritization. There are common problems in the requirement phase like requirement overflow, insufficient stakeholder input, and wrong prioritization of requirement. Although, there are some techniques available for prioritizing the selected stakeholders but existing processes hold so many limitations and not adequate for all system. For that reason, existing processes are not sufficient to set the selected stakeholders’ priority properly. The research study has been performed for offering a systematic way of stakeholder prioritization. We proposed a new approach which is based on ‘fuzzy logic’ for sorting the key stakeholders. It is essential to construct a model that does with some criteria, which are based on stakeholder’s conducts considering a project for a specific organization. The parameters of those criteria will be filled up by numeric values, which will be organized by viewing stakeholders’ profiles, conducting interview session, doing a survey based on questionnaire, making discussion with all the individual stakeholders and so forth. As a result, a sorted list of stakeholders will be the output that is the desired stakeholders’ prioritization list, where the technique of ‘fuzzy expert system’ is applied. Besides, a case study is gone through on school management system based on the proposed framework that provided for making a self- judgment on our current research paper of stakeholder prioritization process.

For details please see the attached file: