Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Machine Learning Evaluation of the Requirement Engineering Process Models for Cloud Computing and Security Issues

Full metadata record
DC Field Value Language
dc.contributor.authorNadeem, Muhammad Asgher-
dc.contributor.authorLee, Scott Uk-Jin-
dc.date.accessioned2021-06-22T06:00:13Z-
dc.date.available2021-06-22T06:00:13Z-
dc.date.issued2020-09-
dc.identifier.issn2076-3417-
dc.identifier.issn2076-3417-
dc.identifier.urihttps://scholarworks.bwise.kr/erica/handle/2021.sw.erica/915-
dc.description.abstractIn the requirement engineering phase, the team members work to get the user requirements, comprehend them and specify them for the next process. There are many models for the requirement engineering phase. There is a need to select the best Requirement Engineering model, and integrate it with cloud computing, that can give the best response to the users and software developers and avoid mistakes in the requirement engineering phase. In this study, these models are integrated with the cloud computing domain, and we report on the security considerations of all the selected models. Four requirement engineering process models are selected for this study: the Linear approach, the Macaulay Linear approach, and the Iterative and Spiral models. The focus of this study is to check the security aspects being introduced by the cloud platform and assess the feasibility of these models for the popular cloud environment SaaS. For the classification of the security aspects that affect the performance of these model, a framework is proposed, and we check the results regarding selected security parameters and RE models. By classifying the selected RE models for security aspects based on deep learning techniques, we determine that the Loucopoulos and Karakostas iterative requirements engineering process model performs better than all the other models.-
dc.format.extent14-
dc.language영어-
dc.language.isoENG-
dc.publisherMDPI-
dc.titleMachine Learning Evaluation of the Requirement Engineering Process Models for Cloud Computing and Security Issues-
dc.typeArticle-
dc.publisher.location스위스-
dc.identifier.doi10.3390/app10175851-
dc.identifier.scopusid2-s2.0-85090012342-
dc.identifier.wosid000570192400001-
dc.identifier.bibliographicCitationApplied Sciences-basel, v.10, no.17, pp 1 - 14-
dc.citation.titleApplied Sciences-basel-
dc.citation.volume10-
dc.citation.number17-
dc.citation.startPage1-
dc.citation.endPage14-
dc.type.docTypeArticle-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaChemistry-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaMaterials Science-
dc.relation.journalResearchAreaPhysics-
dc.relation.journalWebOfScienceCategoryChemistry, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryEngineering, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryMaterials Science, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryPhysics, Applied-
dc.subject.keywordAuthorrequirement engineering models-
dc.subject.keywordAuthorsecurity of RE model-
dc.subject.keywordAuthorclassification of requirement engineering models-
dc.identifier.urlhttps://www.proquest.com/docview/2438346360?accountid=11283-
Files in This Item
Go to Link
Appears in
Collections
COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Scott Uk Jin photo

Lee, Scott Uk Jin
ERICA 소프트웨어융합대학 (ERICA 컴퓨터학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE