Software Quality by Misuse Analysis

نویسندگان

  • Andrea Herrmann
  • Barbara Paech
چکیده

Case study in section 6 was removed because it is confidential 2 Case study in section 6 was removed because it is confidential Case study in section 6 was removed because it is confidential 4 Case study in section 6 was removed because it is confidential Abstract: The research project SIKOSA is funded by the Ministery for Science, Research and Art of Baden-Württemberg, Germany (Ministerium für Wissenschaft, Forschung und Kunst Baden-Württemberg). We also want to thank Damian Plaza who spent many hours on the case study. Within the research project SIKOSA and its work package " Requirements " a method for requirements elicitation and documentation has been developed which derives all types of non-functional requirements by using misuse cases, not only security requirements. This " Misuse-oriented Quality Requirements Engineering " method (short: MOQARE) has been integrated with the elicitation and documentation of functional requirements. There are several methods for the derivation and analysis of detailed non-functional requirements. These methods often are designed for a restricted field of application, e.g. misuse cases for top-down derivation of requirements detailing the quality attribute " security " , or ATAM for evaluating given architectural alternatives. In this work, we apply misuse cases to any other quality attribute (e.g. usability, maintainability) to develop a method for deriving detailed non-functional and functional requirements from any quality attribute. Doing so, we find that generalizations have to be made to the definitions of the misuse case concepts, and new concepts must be included. We applied our method successfully in a case study. It was a good tool for systematic and concrete requirements elicitation easily understood by the stakeholders and leading to realizable requirements. By the " Misuse-oriented Quality Requirements Engineering " method (short: MOQARE), NFR were operationalized as to be realizable, and at the end, further FRs for the system were found and constraints to FRs. Therefore, it makes sense to present the results of the NFR method with the FRs in an integrated presentation. Such a presentation will be a good basis for the design, implementation and test of the system, much better than a separate presentation of FR and NFR. This working paper is the first out of a series which will be produced in the SIKOSA research project. While here the integration of NFR and FR during the requirements elicitation is treated, later papers will investigate the interface between requirements and architectural design, requirements and …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Measuring Software Security using MACOQR (Misuse and Abuse Case Oriented Quality Requirement) Metrics: Defensive Perspective

The present age, software is exploited and the understanding of increasing extent of risk exposure as a result is rarely developed. Security should be incorporate right from the requirements phase so that the security is inbuilt and properly incorporated into the software in development. To establish the fact that a process is improving or not is a matter that seems impossible without obtaining...

متن کامل

Turning Eclipse Against Itself: Improving the Quality of Eclipse Plugins

While many researchers have used Eclipse as a platform for developing software engineering and program analysis tools, Eclipse itself presents an excellent subject for analysis and study. Eclipse represents one of the biggest Java projects ever created. While surprisingly robust, Eclipse still suffers from serious bugs that lead to crashes and resource exhaustion. Eclipse is a collaborative dev...

متن کامل

Identifying Modeling Errors in Signatures by Model Checking

Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined patterns. The matching rules are called signatures. The definition of signatures is up to now an empirical process based on expert knowledge and experience. The analysis success and accordingly the acceptance of intrus...

متن کامل

Quality Misuse

There are several methods for the derivation and analysis of detailed non-functional requirements. They often are designed for a special application, like misuse cases for top-down derivation of requirements detailing the quality attribute “security”, or ATAM for evaluating given architectural alternatives. In this work, we apply misuse cases to any other quality attribute (e.g. usability, effi...

متن کامل

Misuse and Abuse Cases: Getting Past the Positive

trend, most systems for designing software also tend to describe positive features. Savvy software practitioners are beginning to think beyond features, touching on emergent properties of software systems such as reliability, security , and performance. This is mostly because experienced customers are beginning to demand secure and reliable software; but in many situations, it's still up to the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007