REQUIREMENTS MANAGEMENT MODEL FOR ANALYTICAL ACCOUNTING SYSTEMS BASED ON CLOUD INFRASTRUCTURE
DOI:
https://doi.org/10.30890/2567-5273.2025-42-02-041Keywords:
requirements management, analytical accounting systems, cloud infrastructure, requirements traceability, cloud scalability, business requirements, analytical systems, adaptive systemsAbstract
This paper proposes a requirements management model for analytical accounting systems based on cloud infrastructure, aimed at ensuring adaptability, scalability, and consistency between business requirements, analytical functionality, and infrastructure rReferences
Guo Z., Tan T., Liu S., Liu X., Lai W., Yang Y., Li Y., Chen L., Dong W., Zhou Y. Mitigating false positive static analysis warnings: Progress, challenges, and opportunities // IEEE Transactions on Software Engineering. – 2023. – Vol. 49, No. 12. – P. 5154–5188. DOI: 10.1109/TSE.2023.3321834.
Nunes P. J. C. Blended security analysis for web applications: Techniques and tools : PhD thesis. – Coimbra : Universidade de Coimbra, 2022. – 221 p. – Режим доступу: https://estudogeral.uc.pt/handle/10316/100340 (дата звернення: 16.12.2025).
Shahid J., Hameed M. K., Javed I. T., Qureshi K. N., Ali M., Crespi N. A comparative study of web application security parameters: Current trends and future directions // Applied Sciences. – 2022. – Vol. 12, No. 8. – P. 4077. DOI: 10.3390/app12084077.
Sönmez F. Ö., Kiliç B. G. Holistic web application security visualization for multi-project and multi-phase dynamic application security test results // IEEE Access. – 2021. – Vol. 9. – P. 25858–25884. DOI: 10.1109/ACCESS.2021.3057044.
Althunayyan M., Saxena N., Li S., Gope P. Evaluation of black-box web application security scanners in detecting injection vulnerabilities // Electronics. – 2022. – Vol. 11, No. 13. – P. 2049. DOI: 10.3390/electronics11132049.
Kree L., Helmke R., Winter E. Using Semgrep OSS to find OWASP Top 10 weaknesses in PHP applications: A case study // Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2024) : Lecture Notes in Computer Science. – Cham : Springer, 2024. – Vol. 14828. – P. 64–83. DOI: 10.1007/978-3-031-49187-0_4.
Popereshnyak S., Vecherkovskaya A., Zhebka V. Intrusion detection based on an intelligent security system using machine learning methods // CEUR Workshop Proceedings. – 2024. – Vol. 3654. – P. 163–178. – Режим доступу: https://ceur-ws.org/Vol-3654/paper14.pdf.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Authors

This work is licensed under a Creative Commons Attribution 4.0 International License.



