By Topic

Visualizing non-functional requirements patterns

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Supakkul, Sam ; Dept. of Comput. Sci., Univ. of Texas at Dallas, Dallas, TX, USA ; Chung, L.

Properly dealing with non-functional requirements (NFRs), such as security and trustworthiness, requires a large body of knowledge about NFRs. Such knowledge can be captured as NFR patterns for reuse. Since knowledge of NFRs can have potentially complex structures and rules, it becomes hard to capture and reuse NFR patterns when they are represented only textually. In this paper, we present an approach to visualizing NFR patterns, including the objective pattern for capturing knowledge of NFRs as goals to be achieved, the problem pattern for capturing problems or obstacles to be avoided in achieving the goals, alternative solutions patterns for problem mitigation, and the selection pattern for choosing among the alternatives in consideration of their side effects. In this approach, not only individual NFR patterns but also relationships between them are visualized, including specialization, composition, and instantiation. An emphasis is placed on a visualization support framework and a model-based tool that capture, organize, apply, and enforce integrity constraints based on model refinement rules, each is applied to incrementally re-create the captured NFR model during reuse. The approach is illustrated using the TJX incident, one of the largest credit card thefts in history, as a running example.

Published in:

Requirements Engineering Visualization (REV), 2010 Fifth International Workshop on

Date of Conference:

28-28 Sept. 2010