Control case approach to record and model non-functional requirements

While the functional requirements of a system can be effectively modeled through the use case driven approach, there is no standard or de facto method for modeling non-functional requirements (NFR) of the system architecture. Often such requirements are dealt with in a reactive manner, rather than proactively. Yet increasingly a contributing factor in project difficulty and failure are the NFR imposed on the solution architecture. This paper outlines a control case approach to record and model NFR. This technique enables the control case to represent the NFR from different perspectives, most typically the various operating conditions. We also propose an extension to the “4 + 1” view model for depicting software architecture by adding the control case view. In addition, a detailed control case modeling example is illustrated to demonstrate how these techniques may be applied during development. Taken together, we suggest that the combination of both the use case and control case views thus reflects the complete requirements across the collective system life cycle views: design, process, implementation and deployment.

[1]  Roel Wieringa,et al.  Design methods for reactive systems - Yourdon, Statemate, and the UML , 2003 .

[2]  Ivar Jacobson,et al.  The unified modeling language reference manual , 2010 .

[3]  Ivar Jacobson,et al.  Unified Modeling Language User Guide, The (2nd Edition) (Addison-Wesley Object Technology Series) , 2005 .

[4]  Ivar Jacobson,et al.  Use cases – Yesterday, today, and tomorrow , 2004, Software & Systems Modeling.

[5]  John Mylopoulos,et al.  Non-Functional Requirements in Software Engineering , 2000, International Series in Software Engineering.

[6]  I. Alexander,et al.  Misuse cases help to elicit non-functional requirements , 2003 .

[7]  D. Redmond-Pyle,et al.  A Standard for Architecture Description , 1999, IBM Syst. J..

[8]  Connie U. Smith,et al.  Performance solutions: a practical guide to creating responsive , 2001 .

[9]  K. Saleh,et al.  CAPTURING NON-FUNCTIONAL SOFTWARE REQUIREMENTS USING THE USER REQUIREMENTS NOTATION , 2004 .

[10]  Christopher J. Pavlovski,et al.  Modeling Architectural Non Functional Requirements: From Use Case to Control Case , 2006, 2006 IEEE International Conference on e-Business Engineering (ICEBE'06).

[11]  Geri Schneider,et al.  Applying Use Cases: A Practical Guide , 1998 .

[12]  Kenneth W. Boyer,et al.  Advanced use case modeling: software systems , 2002, SOEN.

[13]  John Mylopoulos,et al.  Towards requirements-driven information systems engineering: the Tropos project , 2002, Inf. Syst..

[14]  John Mylopoulos,et al.  Representing and Using Nonfunctional Requirements: A Process-Oriented Approach , 1992, IEEE Trans. Software Eng..

[15]  Ivar Jacobson,et al.  Object-oriented software engineering - a use case driven approach , 1993, TOOLS.

[16]  Wei-Tek Tsai,et al.  Pi4SOA: A Policy Infrastructure for Verification and Control of Service Collaboration , 2006, 2006 IEEE International Conference on e-Business Engineering (ICEBE'06).

[17]  Andreas L. Opdahl,et al.  Eliciting security requirements with misuse cases , 2004, Requirements Engineering.

[18]  P. Krutchen,et al.  The Rational Unified Process: An Introduction , 2000 .

[19]  Philippe Krutchen,et al.  Architectural blueprints--the '4+1' view model of software architecture , 1995 .

[20]  Ivar Jacobson,et al.  Object Oriented Development in an Industrial Environment , 1987, OOPSLA.

[21]  Philippe Kruchten,et al.  Architecture blueprints—the “4+1” view model of software architecture , 1995, TRI-Ada '95.

[22]  G. Stoneburner,et al.  Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .

[23]  MylopoulosJohn,et al.  Towards requirements-driven information systems engineering , 2002 .

[24]  S. Mohan,et al.  Performance Solutions: A Practical Guide to Creating Responsive, Scalable Software [Book Review] , 2003, IEEE Software.

[25]  Philippe Kruchten,et al.  The 4+1 View Model of Architecture , 1995, IEEE Softw..

[26]  Julio Cesar Sampaio do Prado Leite,et al.  On Non-Functional Requirements in Software Engineering , 2009, Conceptual Modeling: Foundations and Applications.

[27]  John P. McDermott,et al.  Using abuse case models for security requirements analysis , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).

[28]  M. Brenner,et al.  Classifying ITIL Processes; A Taxonomy under Tool Support Aspects , 2006, 2006 IEEE/IFIP Business Driven IT Management.

[29]  Paul Clements,et al.  Software Architecture: An Executive Overview , 1996 .

[30]  Zhixiong Liu,et al.  Towards Modeling Non-Functional Requirements in Software Architecture , 2005 .

[31]  Alistair Cockburn,et al.  Patterns for Effective Use Cases , 2002 .