Requirements Engineering

Non-Functional Requirements (NFR), as its emergence, is a buzzword that is mostly overused while remaining obscure. There is no consensus on what NFR is, how to identify NFR during software development, and what capabilities a desired NFR modeling approach should deliver. To this end, this paper proposes a process-oriented conceptual framework on NFR. It explicitly distinguishes NFR from applicationindependent domain knowledge, such as quality attributes, tactics, and various constraints, then defines NFR as the composition in specific contexts of domain knowledge and various system abstractions, which include not only the target system, but software models that conceptually define the target system at early stages of software development. Enlightened by the framework, we produce a checklist for NFR identification in the whole development process. We also analyze the methodological implications of our framework and discuss the fundamental capabilities of a desired NFR modeling approach.

[1]  Mariëlle den Hengst,et al.  Assessing the Quality of Collaborative Processes , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[2]  S. Kanmani,et al.  Survey and analysis on Security Requirements Engineering , 2012, Comput. Electr. Eng..

[3]  Isabelle Comyn-Wattiau,et al.  Ontologies for Security Requirements: A Literature Survey and Classification , 2012, CAiSE Workshops.

[4]  John Mylopoulos,et al.  ST-tool: a CASE tool for security requirements engineering , 2005, 13th IEEE International Conference on Requirements Engineering (RE'05).

[5]  Yuanyuan Zhang,et al.  App store mining and analysis: MSR for app stores , 2012, 2012 9th IEEE Working Conference on Mining Software Repositories (MSR).

[6]  Gunnar Peterson Building Security In , 2006 .

[7]  Eric S. K. Yu,et al.  A Semi-automated Decision Support Tool for Requirements Trade-Off Analysis , 2011, 2011 IEEE 35th Annual Computer Software and Applications Conference.

[8]  Kurt Schneider,et al.  Feedback in Context: Supporting the Evolution of IT-Ecosystems , 2010, PROFES.

[9]  James Noble,et al.  Patterns for essential use case bodies , 2003 .

[10]  Bernd Heinrich,et al.  Granularity of Services , 2011, Bus. Inf. Syst. Eng..

[11]  Mario Piattini,et al.  Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes , 2006, TrustBus.

[12]  Olivia R. Liu Sheng,et al.  Examining the Technology Acceptance Model Using Physician Acceptance of Telemedicine Technology , 1999, J. Manag. Inf. Syst..

[13]  William Yurcik,et al.  Threat Modeling as a Basis for Security Requirements , 2005 .

[14]  Pierluigi Roberti,et al.  STS-tool: Socio-technical Security Requirements through social commitments , 2012, 2012 20th IEEE International Requirements Engineering Conference (RE).

[15]  Evan W. Duggan,et al.  Higher Quality Requirements: Supporting Joint Application Development with the Nominal Group Technique , 2003, Inf. Technol. Manag..

[16]  Birgit Pfitzmann,et al.  Security in Business Process Engineering , 2003, Business Process Management.

[17]  Andrew Gemino,et al.  A framework for empirical evaluation of conceptual modeling techniques , 2004, Requirements Engineering.

[18]  Jan Jürjens,et al.  Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec , 2010, Requirements Engineering.

[19]  Claudia Steghuis Service granularity in SOA-projects : a trade-off analysis , 2006 .

[20]  John Viega Building security requirements with CLASP , 2005, SOEN.

[21]  Tore Dybå,et al.  A systematic review of statistical power in software engineering experiments , 2006, Inf. Softw. Technol..

[22]  Muneera Bano,et al.  Service Oriented Requirements Engineering: Practitioner's Perspective , 2013, ICSOC Workshops.

[23]  Bernd Fröhlich,et al.  The cubic mouse: a new device for three-dimensional input , 2000, CHI.

[24]  Laurence Brooks,et al.  CHAPTER 53 APPLYING SOCIAL-TECHNICAL APPROACH FOR COTS SELECTION * , 1999 .

[25]  A. Gehlert,et al.  Goal-Driven Alignment of Services and Business Requirements , 2008, 2008 International Workshop on Service-Oriented Computing: Consequences for Engineering Requirements.

[26]  Muneera Bano,et al.  User involvement in software development and system success: a systematic literature review , 2013, EASE '13.

[27]  Maria Kutar,et al.  Cognitive Dimensions of Notations: Design Tools for Cognitive Technology , 2001, Cognitive Technology.

[28]  H. Kaindl,et al.  How to Combine Requirements Engineering and Interaction Design? , 2008, 2008 16th IEEE International Requirements Engineering Conference.

[29]  Massimiliano Di Penta,et al.  An experimental investigation of formality in UML-based development , 2005, IEEE Transactions on Software Engineering.

[30]  Tore Dybå,et al.  Challenges and Recommendations When Increasing the Realism of Controlled Software Engineering Experiments , 2003, ESERNET.

[31]  Günther Pernul,et al.  Viewing Business-Process Security from Different Perspectives , 1999, Int. J. Electron. Commer..

[32]  Naveed Ikram,et al.  What makes service oriented requirements engineering challenging? a qualitative study , 2014, IET Softw..

[33]  Mike P. Papazoglou,et al.  Service-oriented design and development methodology , 2006, Int. J. Web Eng. Technol..

[34]  John C. Grundy,et al.  Improving requirements quality using essential use case interaction patterns , 2011, 2011 33rd International Conference on Software Engineering (ICSE).

[35]  Massila Kamalrudin,et al.  A review on tool supports for security requirements engineering , 2013, 2013 IEEE Conference on Open Systems (ICOS).

[36]  Zhong Chen,et al.  Extracting Service Aspects from Web Reviews , 2010, WISM.

[37]  Neil A. M. Maiden,et al.  Using Mobile RE Tools to Give End-Users Their Own Voice , 2010, 2010 18th IEEE International Requirements Engineering Conference.

[38]  Mohammad Zulkernine,et al.  Intrusion detection aware component-based systems: A specification-based framework , 2007, J. Syst. Softw..

[39]  Neil A. M. Maiden,et al.  Discovering Web Services to Improve Requirements Specifications: Does It Help? , 2008, REFSQ.

[40]  Harold A. Linstone,et al.  The Unbounded Mind: Breaking the Chains of Traditional Business Thinking , 1993 .

[41]  S. Adam,et al.  Deriving Software Services from Business Processes of Representative Customer Organizations , 2008, 2008 International Workshop on Service-Oriented Computing: Consequences for Engineering Requirements.

[42]  Jing Du,et al.  An Analysis for Understanding Software Security Requirement Methodologies , 2009, 2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement.

[43]  Kristina Winbladh,et al.  Analysis of user comments: An approach for software requirements evolution , 2013, 2013 35th International Conference on Software Engineering (ICSE).

[44]  Donald Firesmith,et al.  Specifying Reusable Security Requirements , 2004, J. Object Technol..

[45]  Xiaozhong Liu,et al.  Predicting popularity of online distributed applications: iTunes app store case analysis , 2011, iConference.

[46]  John C. Grundy,et al.  Managing Consistency between Textual Requirements, Abstract Interactions and Essential Use Cases , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference.

[47]  Walid Maalej,et al.  User feedback in the appstore: An empirical study , 2013, 2013 21st IEEE International Requirements Engineering Conference (RE).

[48]  John Mylopoulos,et al.  Modeling security requirements through ownership, permission and delegation , 2005, 13th IEEE International Conference on Requirements Engineering (RE'05).

[49]  Rudolf Vetschera,et al.  Preference-Based Decision Support in Software Engineering , 2006, Value-Based Software Engineering.

[50]  Shareeful Islam,et al.  SecTro: A CASE Tool for Modelling Security in Requirements Engineering using Secure Tropos , 2011, CAiSE Forum.

[51]  Matthias Galster,et al.  A Business-Goal-Service-Capability Graph for the Alignment of Requirements and Services , 2008, 2008 IEEE Congress on Services - Part I.

[52]  Jan Jürjens,et al.  Enhancing security requirements engineering by organizational learning , 2012, Requirements Engineering.

[53]  Naveed Ikram,et al.  Issues and Challenges of Requirement Engineering in Service Oriented Software Development , 2010, 2010 Fifth International Conference on Software Engineering Advances.