Modeling Architectural Non Functional Requirements: From Use Case to Control Case

While the functional requirements of a system can be effectively modeled through the use case driven approach, there is no standard or de facto method for modeling non-functional requirements of the system architecture. Often such requirements are dealt with in a reactive manner rather than proactively. Yet increasingly a contributing factor in project difficulty and failure are the non-functional requirements imposed on the solution architecture. This paper proposes a control case approach to record and model non-functional requirements. This technique enables the control case to represent the nonfunctional requirements from different perspectives, most typically the various operating conditions. Furthermore, we propose an extension to the "4+1" view model for depicting software architecture by adding the control case view. The combination of both the use case and control case views thus reflects the complete requirements across the collective system life cycle views: design, process, implementation and deployment

[1]  John Mylopoulos,et al.  Representing and Using Nonfunctional Requirements: A Process-Oriented Approach , 1992, IEEE Trans. Software Eng..

[2]  Philippe Krutchen,et al.  Architectural blueprints--the '4+1' view model of software architecture , 1995 .

[3]  Ivar Jacobson,et al.  Object-oriented software engineering - a use case driven approach , 1993, TOOLS.

[4]  Ivar Jacobson,et al.  Object-oriented development in an industrial environment , 1987, OOPSLA '87.

[5]  Geri Schneider,et al.  Applying use cases (2nd ed.): a practical guide , 2001 .

[6]  Ivar Jacobson,et al.  Use cases – Yesterday, today, and tomorrow , 2004, Software & Systems Modeling.

[7]  Ivar Jacobson,et al.  The unified modeling language reference manuel - covers UML 2.0, Second Edition , 2005, Addison Wesley object technology series.

[8]  P. Krutchen,et al.  The Rational Unified Process: An Introduction , 2000 .

[9]  W BoyerKenneth Advanced use case modeling , 2002 .

[10]  Ivar Jacobson,et al.  Object Oriented Development in an Industrial Environment , 1987, OOPSLA.

[11]  G. Stoneburner,et al.  Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .

[12]  I. Alexander,et al.  Misuse cases help to elicit non-functional requirements , 2003 .

[13]  John E. Dobson,et al.  A Methodology for Analysing Human and Computer-related Issues in Secure Systems , 1990 .

[14]  Paul Clements,et al.  Software Architecture: An Executive Overview , 1996 .

[15]  K. Saleh,et al.  CAPTURING NON-FUNCTIONAL SOFTWARE REQUIREMENTS USING THE USER REQUIREMENTS NOTATION , 2004 .

[16]  L. Laibinis,et al.  Fault Tolerance in Use-Case Modeling , 2005 .

[17]  Andreas L. Opdahl,et al.  Eliciting security requirements with misuse cases , 2000, Proceedings 37th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Pacific 2000.

[18]  Jos Warmer,et al.  The object constraint language , 1998 .

[19]  D. Redmond-Pyle,et al.  A Standard for Architecture Description , 1999, IBM Syst. J..

[20]  Alistair Cockburn,et al.  Patterns for Effective Use Cases , 2002 .

[21]  Ivar Jacobson,et al.  The Unified Modeling Language Reference Manual, Second Edition , 2005 .

[22]  Connie U. Smith,et al.  Performance solutions: a practical guide to creating responsive , 2001 .

[23]  Zhixiong Liu,et al.  Towards Modeling Non-Functional Requirements in Software Architecture , 2005 .

[24]  Alan M. Davis,et al.  Using Requirements Management to Speed Delivery of Higher Quality Applications , 1996 .

[25]  Philippe Kruchten,et al.  Architecture blueprints—the “4+1” view model of software architecture , 1995, TRI-Ada '95.

[26]  Philippe Kruchten,et al.  The 4+1 View Model of Architecture , 1995, IEEE Softw..

[27]  John P. McDermott,et al.  Using abuse case models for security requirements analysis , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).