V. N. Franqueira, T. Tun, Y. Yu, R. Wieringa, B. Nuseibeh
{"title":"Risk and argument: A risk-based argumentation method for practical security","authors":"V. N. Franqueira, T. Tun, Y. Yu, R. Wieringa, B. Nuseibeh","doi":"10.1109/RE.2011.6051659","DOIUrl":"https://doi.org/10.1109/RE.2011.6051659","url":null,"abstract":"When showing that a software system meets certain security requirements, it is often necessary to work with formal and informal descriptions of the system behavior, vulnerabilities, and threats from potential attackers. In earlier work, Haley et al. [1] showed structured argumentation could deal with such mixed descriptions. However, incomplete and uncertain information, and limited resources force practitioners to settle for good-enough security. To deal with these conditions of practice, we extend the method of Haley et al. with risk assessment. The proposed method, RISA (RIsk assessment in Security Argumentation), uses public catalogs of security expertise to support the risk assessment, and to guide the security argumentation in identifying rebuttals and mitigations for security requirements satisfaction. We illustrate RISA with a realistic example of PIN Entry Device.","PeriodicalId":385129,"journal":{"name":"2011 IEEE 19th International Requirements Engineering Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122305946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the joint use of i∗ with other modelling frameworks: A vision paper","authors":"Xavier Franch, A. Maté, J. Trujillo, Carlos Cares","doi":"10.1109/RE.2011.6051642","DOIUrl":"https://doi.org/10.1109/RE.2011.6051642","url":null,"abstract":"The use of the i∗ (iStar) framework by the requirements engineering community is many-fold. Among the several possible engineering cases, we are particularly interested here in the joint use of i∗ with other modelling frameworks to obtain what we call i∗-based frameworks. In this context, several challenges need to be overcome: theoretical, technical, methodological and community-related. In this paper, we review current i∗-based frameworks under several possible scenarios and observe that not all of these challenges are always addressed, and even more, there is lack of guidelines or well-accepted methodological design steps on how to overcome these issues. Then, we detail the several engineering artifacts and techniques whose consideration in i∗-based frameworks may help to overcome them. To illustrate the vision, we present the case of combining i∗ with data warehouse models, from the initial definition of the ontology to the final implementation using profiles. Finally, we provide a research agenda to apply the proposed vision including a final reflection on defining a maturity model as a convenient way to support forthcoming research in the topic.","PeriodicalId":385129,"journal":{"name":"2011 IEEE 19th International Requirements Engineering Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130236960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolving specifications formally","authors":"P. Sampath, Silky Arora, S. Ramesh","doi":"10.1109/RE.2011.6051651","DOIUrl":"https://doi.org/10.1109/RE.2011.6051651","url":null,"abstract":"This paper presents a formal specification and analysis method motivated by issues faced during early stages of requirements development for automotive features. At this early stage of development, only overall goals of features are understood, and there is a need to discover all possible scenarios of operation. We have developed a formalism — Structured Transition Systems (STS) — that facilitates the rapid evolution of specifications. STS supports multiple idioms of specification : transitions, state-diagrams, scenarios etc. It also supports constructs for hierarchical organization of a specification. We have further defined analyses that are useful for review and inspection of STS specifications. A distinctive feature of our method is the ability to use analysis results to refine and reinforce parts of the specification by importing analysis results into STS specifications. In practice, this leads to a feedback loop where requirements can be rapidly refined using analysis engines to drive the development of requirements. We have experimented using our technique on a number of automotive case-studies, and we present some of our experiences with these case-studies.","PeriodicalId":385129,"journal":{"name":"2011 IEEE 19th International Requirements Engineering Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130082750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Focusing spontaneous feedback to support system evolution","authors":"K. Schneider","doi":"10.1109/RE.2011.6051645","DOIUrl":"https://doi.org/10.1109/RE.2011.6051645","url":null,"abstract":"Modern software systems are rarely built from scratch. They rather evolve over a long period of time while components and subsystems are developed independently. During that evolution, new and changing requirements emerge when end-users interact with the system. Users encounter situations that provoke spontaneous complaints or suggestions, which may be the seed of new requirements. However, there are two challenges: How to capture spontaneous reactions and how to focus and let them mature into valid requirements? We propose concepts that enable citizens to report a problem or make a suggestion by Smartphone. A key for preserving the spontaneous impetus is to lower the threshold for composing and sending feedback. Software providers who are interested in feedback can define filtering and focusing aids; they guide end-users in giving focused feedback. Focused feedback is also better prepared to be transformed to requirements. Our Con-Texter tool demonstrates technical feasibility of these concepts. We explore and characterize a potential application domain empirically. Based on the findings, we discuss potentials and limitations of our approach.","PeriodicalId":385129,"journal":{"name":"2011 IEEE 19th International Requirements Engineering Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116828957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TraCter: A tool for candidate traceability link clustering","authors":"Anas Mahmoud, Nan Niu","doi":"10.1109/RE.2011.6051663","DOIUrl":"https://doi.org/10.1109/RE.2011.6051663","url":null,"abstract":"Automated tracing tools employ information retrieval (IR) methods to recover traceability links between software artifacts. A large body of research is available on the back-end design of such tools, including artifacts indexing and the underlying IR mechanism. In contrast, less attention has been paid to the front-end presentation of the retrieved results. This paper describes TraCter, a result categorization tool with novel search user interfaces. We discuss the key features of TraCter and its potential improvements over previous work.","PeriodicalId":385129,"journal":{"name":"2011 IEEE 19th International Requirements Engineering Conference","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127356865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Structured and unobtrusive observation of anonymous users and their context for requirements elicitation","authors":"Olesia Brill, E. Knauss","doi":"10.1109/RE.2011.6051660","DOIUrl":"https://doi.org/10.1109/RE.2011.6051660","url":null,"abstract":"Today, people find themselves surrounded by IT systems in their everyday life. Often they are not even aware that they are interacting with an IT system. More and more of these systems are context adaptive. Requirements to such systems may change for various reasons: The context may fundamentally change when other systems are introduced. New trends and fashions may evolve. Operators need to react quickly to such changes if they want to keep their systems competitive. Traditional approaches to requirements elicitation start to fail in this situation: context adaptive systems serve many users with different profiles. In addition, users may be reluctant to participate in improving it. Thus, it is hard to establish a representative model of requirements. Furthermore, it is hard to capture the context of requirements by subsequent interviews. In this paper we present a systematical approach for requirements elicitation based on observing anonymous users. The interaction of users with the system is observed in the normal working context. Observation is based on assumptions on how interaction should take place. Deviations from these assumptions point to new requirements. Observing a large number of users leads to a quantitative map of requirements in context. Preliminary evaluation shows that the approach is promising. It allows efficient observation of many stakeholders and the derivation of new requirements.","PeriodicalId":385129,"journal":{"name":"2011 IEEE 19th International Requirements Engineering Conference","volume":"461 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131646850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Eliciting usable security requirements with misusability cases","authors":"Shamal Faily, I. Flechais","doi":"10.1109/RE.2011.6051665","DOIUrl":"https://doi.org/10.1109/RE.2011.6051665","url":null,"abstract":"Although widely used for both security and usability concerns, scenarios used in security design may not necessarily inform the design of usability, and vice-versa. One way of using scenarios to bridge security and usability involves explicitly describing how design decisions can lead to users inadvertently exploiting vulnerabilities to carry out their production tasks. We present Mis-usability Cases: scenarios which describe how design decisions may lead to usability problems subsequently leading to system misuse. We describe the steps carried out to develop and apply misusability cases to elicit requirements and report preliminary results applying this technique in a recent case study.","PeriodicalId":385129,"journal":{"name":"2011 IEEE 19th International Requirements Engineering Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131316843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"iRequire: Gathering end-user requirements for new apps","authors":"N. Seyff, Gregor Ollmann, Manfred Bortenschlager","doi":"10.1109/RE.2011.6051669","DOIUrl":"https://doi.org/10.1109/RE.2011.6051669","url":null,"abstract":"Mobile devices such as Smartphones and Internet Tablets have become an integral part of our life. We can install applications providing various functionalities. Our research focuses on an application which enables end-users to blog requirements in situ. The gathered end-user needs can be seen as a starting point for the development of applications and the evolution of mobile platforms.","PeriodicalId":385129,"journal":{"name":"2011 IEEE 19th International Requirements Engineering Conference","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131410998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Logical structure extraction from software requirements documents","authors":"Rehan Rauf, M. Antkiewicz, K. Czarnecki","doi":"10.1109/RE.2011.6051638","DOIUrl":"https://doi.org/10.1109/RE.2011.6051638","url":null,"abstract":"Software requirements documents (SRDs) are often authored in general-purpose rich-text editors, such as MS Word. SRDs contain instances of logical structures, such as use case, business rule, and functional requirement. Automated recognition and extraction of these instances enables advanced requirements management features, such as automated traceability, template conformance checking, guided editing, and interoperability with requirements management tools such as RequisitePro. The variability in content and physical representation of these instances poses challenges to their accurate recognition and extraction. To address these challenges, we present a framework allowing 1) the specification of logical structures in terms of their content, textual rendering, and variability and 2) the extraction of instances of such structures from rich-text documents. Our evaluation involves 36 different logical structures identified in 43 SRDs and shows that the intended content, style, and variability of these structures can be specified in the framework such that their instances can be extracted from the documents with high precision and recall, both close to 100%.","PeriodicalId":385129,"journal":{"name":"2011 IEEE 19th International Requirements Engineering Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114880856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kyoko Ohashi, H. Kurihara, Yuka Tanaka, Rieko Yamamoto
{"title":"A means of establishing traceability based on a UML model in business application development","authors":"Kyoko Ohashi, H. Kurihara, Yuka Tanaka, Rieko Yamamoto","doi":"10.1109/RE.2011.6051631","DOIUrl":"https://doi.org/10.1109/RE.2011.6051631","url":null,"abstract":"This paper describes an easy means of setting traceability in business application artifacts. The traceability is established for completeness verification and impact analysis. There are thousands of functions and screens in real business applications. It is difficult to establish suitable links from these many elements. In addition, there is a constraint that the workload of setting traceability links should be small. This paper proposes a two-step approach to establish traceability in artifacts. In the first step, the software model defines traceability. In the second step, a developer him/herself sets up traceability links during the design phase. The purpose of the first step is to restrict of the set of linkable elements, while the purpose of the second step is to establish links according to the developer's intentions. We also devise the second step in two points. The first point is to make a developer set up links while he/she is working on the design. The second point is appropriate categorization to reduce the number of candidate links. We also propose a support tool for setting up links. The approach and tool decrease the developer's workload. This paper provides details and evaluation on this model-based approach and tool.","PeriodicalId":385129,"journal":{"name":"2011 IEEE 19th International Requirements Engineering Conference","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123074029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}