Measuring Satisfaction of Security Requirements Using Fuzzy Soft Set Theory
DOI:
https://doi.org/10.47852/bonviewJCCE52026871Keywords:
security requirements, software development, software engineers, software systems, software vulnerabilitiesAbstract
In recent years, a range of innovative approaches have been developed to tackle decision-making challenges more effectively. These approaches include concepts such as probability theory, fuzzy set theory, intuitionistic fuzzy sets, vague sets, interval mathematics, and rough set theory. These tools each offer unique approaches to managing uncertainty and imprecision, which are common when working with complex systems. One major issue in software development is failure to meet security requirements. This can be caused by a variety of factors, such as unclear security specifications, evolving threat landscapes, or gaps in communication among stakeholders. To address this persistent problem, this paper introduces a new method designed to quantify security requirements more accurately and streamline the decision-making process for assessing security risks. This approach is based on fuzzy soft set theory, which allows for more flexible and precise handling of uncertain or ambiguous information. By using this method, software engineers and security professionals can gain a clearer understanding of security risks and make better-informed decisions when building secure systems. To demonstrate the practical value of the proposed method, a case study is conducted to evaluate its effectiveness. The results of this case study suggest that security administrators can use this method to implement more targeted and efficient security measures, ensuring that the systems they develop are more resilient to potential threats.
Received: 20 July 2025 | Revised: 20 October 2025 | Accepted: 31 October 2025
Conflicts of Interest
The authors declare that they have no conflicts of interest to this work.
Data Availability Statement
Data are available from the corresponding author upon reasonable request.
Author Contribution Statement
Dyala Ibrahim: Conceptualization, Software, Resources, Data curation, Writing – review & editing, Supervision, Project administration. Omar Isam Al Mrayat: Conceptualization, Methodology, Software, Resources, Data curation, Writing – review & editing, Supervision, Project administration. Lial Raja Alzabin: Software, Resources, Data curation, Visualization. Ahmad Alajarmeh: Validation, Visualization. Ahmad Reda Alzighaibi: Validation, Formal analysis, Writing – original draft. Hasan Hashim: Investigation. El-Sayed Atlam: Investigation. Malik Jawarneh: Investigation.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Authors

This work is licensed under a Creative Commons Attribution 4.0 International License.