Skip to main content
. 2014 Mar 12;5(4):463–472. doi: 10.1016/j.jare.2014.03.001

Table 5.

The comparison results with Haley’s methodology.

Haley’s methodology results
Security requirements:
SR1: only HR staff can edit or view salary information
SR2: information passing over the network must not be understandable by an eavesdropper



The proposed methodology results
Security requirements:
SR1: Authorized HR staff only is allowed to view salary information and the data sent over the campus network should not be understandable by eavesdroppers
SR2: Modification or creation of salary information is allowed only to authorized HR staff and not allowed to unauthorized users and the data sent over the campus network should not be understandable by eavesdroppers
SR3: Modification of salary information should be logged
SR4: The security validation state is accepted only if the user using identity of a HR staff is actually a HR staff