Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
ANALYSIS
Requirements engineering include two main activities:
Requirement elicitation
Requirement analysis
Requirement Elicitation:
Requirement elicitation results in the specification of the system that the client
understands, and analysis results in the analysis model that the developers can
unambiguously interpret. Requirement elicitation is the more challenging because it
requires the collaboration of several groups of participants with different
backgrounds.
Requirement elicitation is about communication among developers, clients,
and users for defining a new system. Failure to communicate and understand each
authors domain results in a system that is difficult to use or that simply fails to support
the users work. Errors introduced during requirement elicitation are expensive to
correct as they are usually discovered late in the process often as late as delivery.
Such errors include:
Missing functionality that the system should have supported.
client, Developers and the users identify a problem area and define a system that
addresses that problem. Such a definition is called a system specification and serves
as a contract between the client and the developers.
Requirement Analysis:
A requirement is a feature that must be included in the system. Before the
actual design and implementation start, getting to know the system to be implemented
is of prime importance.
Main emphasis should be on:
With respect to the system itself, the following facts should be taking into
consideration
The major processes involved.
The present system consist no security features to the TEXT file data. In the
existing system the text file data is sending in the network channels without
encrypting the file data.
Drawbacks:
There is no confidentiality to TEXT file data in transmission of the file in the
networks.
There is no authentication to the TEXT file.
The intruders may attack the TEXT file.
Lake of Integrity, Access Control and Availability.
It will take more space in the transmission of the TEXT file.
PROPOSED SYSTEM :
OVER VIEW:
The proposed system is based on cryptography features to the TEXT file. The
TEXT file selected is converted into bitmap image file using algorithms. The
proposed system takes TEXT file and Encryption key as input and gives encrypted
Bmp file based on the selection of specified algorithm techniques. This system
provides security services and the conversion to the TEXT file.
Advantages:
This system provides security service like Confidentiality.
The system provides compression to the TEXT file.
The system maintains same format after providing security features.
FUNCTIONAL REQURIMENTS:
Functional requirements describe the interactions between the system and its
environment independent of its implementation. The environment includes the user
and any other external system with which the system interacts.
The following are the functional requirements for the proposed system.
The system takes text file and 16-bit secret key as input to the system.
between the system and its external world. The above description does not focus on
any of the implementation details.
NON-FUNCTIONAL REQUIREMENTS:
64 MB
Hard Disk
4 MB
Processor
Performance Characteristics:
The operations done in this system are according to the
algorithms selected. Here the system just executes those operations .
So, here the performance will depend on the efficiency of the
algorithm used.
PSEUDO REQUIREMENTS:
Pseudo Requirements are requirements imposed by the client that restrict the
implementation of the system. Typical pseudo requirements are the implementation
language and the platform on which the system is to be implemented.
Pseudo requirements have usually no direct effect on the users view of the system.
The client has imposed that the system must be developed or written using JAVA, to
comply with the current company policy.
The minimum software requirements are:
Operating System
MS-DOS
Language
JAVA 1.5