Methods of validating requirements
Simple range and constraint validation may examine user input for consistency with a minimum/maximum range, or consistency with a test for evaluating a sequence of characters, such as one or more tests against regular expressions.
For example, a US phone number should have 10 digits and no letters or special characters.
Therefore, data validation should start with business process definition and set of business rules within this process.
Rules can be collected through the requirements capture exercise.
For example, an experienced user may enter a well-formed string that matches the specification for a valid e-mail address, as defined in RFC 5322 but that well-formed string might not actually correspond to a resolvable domain connected to an active e-mail account.
Structured validation allows for the combination of any of various basic data type validation steps, along with more complex processing.
The Validation rule or check system still used by many major software manufacturers was designed by an employee at Microsoft sometime between 19.
This paper describes the specification, validation and verification of system and soft- ware requirements using the SCR tabular method and tools.