By Topic

Managing system design requirements information

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Estes, B. ; Sandia Nat. Labs., Albuquerque, NM, USA ; Pritchard, D.

Sandia National Laboratories (SNL), Security Technology Department provides program support to design security systems and related improvements. During one of these projects, a relational database system was developed to categorize and to help cross match the requirements from several documents. A "design requirements" matrix was created that shows the requirements met by the improved security system. The system is flexible and easy-to-use. Even though it is only a prototype, the application's forms, queries, reports and the requirements data could be reused by other projects. The strengths of the system are the ability to use text searches of the database to aid in the categorization and customized reporting of the information from the requirements documents. A document's metadata (e.g., name, chapter, section, paragraph, etc.) is stored with the related text in the database. The security classification and other information associated with a paragraph are included. User defined "requirement categories" (e.g., alarms, barriers, fences, standoff) can be assigned to appropriate paragraphs from the requirements document. Relevant design document paragraphs can be matched with the "requirement categories". Selected lines can be included or excluded from the reports. The resulting customized reports can be reported or exported as Excel or rich text format files where additional formatting may be applied.

Published in:

Security Technology, 2004. 38th Annual 2004 International Carnahan Conference on

Date of Conference:

11-14 Oct. 2004