REQUIREMENTS MANAGEMENT MODEL FOR ANALYTICAL ACCOUNTING SYSTEMS BASED ON CLOUD INFRASTRUCTURE

Authors

DOI:

https://doi.org/10.30890/2567-5273.2025-42-02-041

Keywords:

requirements management, analytical accounting systems, cloud infrastructure, requirements traceability, cloud scalability, business requirements, analytical systems, adaptive systems

Abstract

This paper proposes a requirements management model for analytical accounting systems based on cloud infrastructure, aimed at ensuring adaptability, scalability, and consistency between business requirements, analytical functionality, and infrastructure r

References

Guo Z., Tan T., Liu S., Liu X., Lai W., Yang Y., Li Y., Chen L., Dong W., Zhou Y. Mitigating false positive static analysis warnings: Progress, challenges, and opportunities // IEEE Transactions on Software Engineering. – 2023. – Vol. 49, No. 12. – P. 5154–5188. DOI: 10.1109/TSE.2023.3321834.

Nunes P. J. C. Blended security analysis for web applications: Techniques and tools : PhD thesis. – Coimbra : Universidade de Coimbra, 2022. – 221 p. – Режим доступу: https://estudogeral.uc.pt/handle/10316/100340 (дата звернення: 16.12.2025).

Shahid J., Hameed M. K., Javed I. T., Qureshi K. N., Ali M., Crespi N. A comparative study of web application security parameters: Current trends and future directions // Applied Sciences. – 2022. – Vol. 12, No. 8. – P. 4077. DOI: 10.3390/app12084077.

Sönmez F. Ö., Kiliç B. G. Holistic web application security visualization for multi-project and multi-phase dynamic application security test results // IEEE Access. – 2021. – Vol. 9. – P. 25858–25884. DOI: 10.1109/ACCESS.2021.3057044.

Althunayyan M., Saxena N., Li S., Gope P. Evaluation of black-box web application security scanners in detecting injection vulnerabilities // Electronics. – 2022. – Vol. 11, No. 13. – P. 2049. DOI: 10.3390/electronics11132049.

Kree L., Helmke R., Winter E. Using Semgrep OSS to find OWASP Top 10 weaknesses in PHP applications: A case study // Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2024) : Lecture Notes in Computer Science. – Cham : Springer, 2024. – Vol. 14828. – P. 64–83. DOI: 10.1007/978-3-031-49187-0_4.

Popereshnyak S., Vecherkovskaya A., Zhebka V. Intrusion detection based on an intelligent security system using machine learning methods // CEUR Workshop Proceedings. – 2024. – Vol. 3654. – P. 163–178. – Режим доступу: https://ceur-ws.org/Vol-3654/paper14.pdf.

Published

2025-12-30

How to Cite

Поперешняк, С., Корнієнко, О., & Віунник, Ю. (2025). REQUIREMENTS MANAGEMENT MODEL FOR ANALYTICAL ACCOUNTING SYSTEMS BASED ON CLOUD INFRASTRUCTURE. Modern Engineering and Innovative Technologies, 2(42-02), 37–47. https://doi.org/10.30890/2567-5273.2025-42-02-041

Issue

Section

Articles