SRSPLAN_06

SRSPLAN_06 - Software Requirements Specifications Document...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
Software Requirements Specifications Document XXXXXXXXX Tor Software Requirements Specification Document Version: (1.1) Date: (10/19/2007) //home/vdimitrov/7724/d7e83d9e760ff537c1819406db9ef59adee0a049.doc Page 1 of 16 05/11/09 f
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Software Requirements Specifications Document Table of Contents 1. Introduction 4 1.1 Purpose 4 1.2 Scope 4 1.3 Definitions, Acronyms, and Abbreviations. 4 1.4 References 4 1.5 Overview 4 2. The Overall Description 4 2.1 Product Perspective 5 2.1.1 System Interfaces 5 2.1.2 User Interfaces 5 2.1.3 Hardware Interfaces 5 2.1.4 Software Interfaces 5 2.1.5 Communications Interfaces 6 2.1.6 Memory Constraints 6 2.1.7 Operations 6 2.1.8 Site Adaptation Requirements 6 2.2 Product Functions 6 2.3 User Characteristics 8 2.4 Constraints 9 2.5 Assumptions and Dependencies 9 2.6 Apportioning of Requirements. 9 3. Specific Requirements 9 3.1 External Interfaces 10 3.2 Functions 11 3.3 Performance Requirements 12 3.4 Logical Database Requirements 12 3.5 Design Constraints 12 3.5.1 Standards Compliance 13 3.6 Software System Attributes 13 3.6.1 Reliability 13 3.6.2 Availability 13 3.6.3 Security 13 3.6.4 Maintainability 14 3.6.5 Portability 14 3.7 Organizing the Specific Requirements 14 3.7.1 System Mode 15 3.7.2 User Class 15 3.7.3 Objects 15 3.7.4 Feature 15 //home/vdimitrov/7724/d7e83d9e760ff537c1819406db9ef59adee0a049.doc Page 2 of 16 05/11/09 f
Background image of page 2
Software Requirements Specifications Document 3.7.5 Stimulus 15 3. 7.6 Response 15 3.7.7 Functional Hierarchy 16 3.8 Additional Comments 16 4.Change Management Process 16 5.Document Approvals 16 6.Supporting Information 16 //home/vdimitrov/7724/d7e83d9e760ff537c1819406db9ef59adee0a049.doc Page 3 of 16 05/11/09 f
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Software Requirements Specifications Document 1. Introduction 1.1 Purpose To provide a safe, secure anonymous network to protect against traffic analysis and network surveillance to protect personal freedom and privacy. 1.2 Scope A program named Tor will be produced, which can be altered to be a server or client on the network. This program will provide a safe, secure, anonymous network to protect privacy of its users. It will help battle against censorship in restricting governments such as China with their firewalls and provide anonymity to people who wouldn’t speak out otherwise. In this network one specific user should not be able to be picked out from the crowd of users. All traffic will be encrypted with RSA encryption until it reaches its exit point. The network will be modled after an onion network. 1.3 Definitions, Acronyms, and Abbreviations. RSA Encryption – An encryption algorithm named after their authors. Onion Network – A network in which the packets have layers of encryption like an onion Anonymity – A person in which his/her personal identity is not known. Lag – Internet Delay
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 16

SRSPLAN_06 - Software Requirements Specifications Document...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online