Skip to main content
Top
Published in: Information Systems and e-Business Management 1/2008

01-01-2008 | Original Article

Control case approach to record and model non-functional requirements

Authors: Joe Zou, Christopher J. Pavlovski

Published in: Information Systems and e-Business Management | Issue 1/2008

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

While the functional requirements of a system can be effectively modeled through the use case driven approach, there is no standard or de facto method for modeling non-functional requirements (NFR) of the system architecture. Often such requirements are dealt with in a reactive manner, rather than proactively. Yet increasingly a contributing factor in project difficulty and failure are the NFR imposed on the solution architecture. This paper outlines a control case approach to record and model NFR. This technique enables the control case to represent the NFR from different perspectives, most typically the various operating conditions. We also propose an extension to the “4 + 1” view model for depicting software architecture by adding the control case view. In addition, a detailed control case modeling example is illustrated to demonstrate how these techniques may be applied during development. Taken together, we suggest that the combination of both the use case and control case views thus reflects the complete requirements across the collective system life cycle views: design, process, implementation and deployment.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Adolph S, Bramble P, Cockburn A, Pols A (2002) Patterns for effective use cases, 1st edn. Addison-Wesley, Boston Adolph S, Bramble P, Cockburn A, Pols A (2002) Patterns for effective use cases, 1st edn. Addison-Wesley, Boston
go back to reference Alexander I (2002) Misuse cases help to elicit nonfunctional requirements. In: Proceedings of 8th international workshop on requirements engineering: Foundation for software quality (REFSQ’02), Essen, Germany Alexander I (2002) Misuse cases help to elicit nonfunctional requirements. In: Proceedings of 8th international workshop on requirements engineering: Foundation for software quality (REFSQ’02), Essen, Germany
go back to reference Armour F, Miller G (2001) Advanced use case modeling. Addison-Wesley, Boston Armour F, Miller G (2001) Advanced use case modeling. Addison-Wesley, Boston
go back to reference Brenner M (2006) Classifying ITIL processes: a taxonomy under tool support aspects. In: The first IEEE/IFIP international workshop on business-driven IT management (BDIM ‘06). Vancouver, Canada, pp 19–28 Brenner M (2006) Classifying ITIL processes: a taxonomy under tool support aspects. In: The first IEEE/IFIP international workshop on business-driven IT management (BDIM ‘06). Vancouver, Canada, pp 19–28
go back to reference Booch G, Jacobson I, Rumbaugh J (1998) UML user guide, Addison-Wesley, Boston Booch G, Jacobson I, Rumbaugh J (1998) UML user guide, Addison-Wesley, Boston
go back to reference Castroa J, Kolpb M, Mylopoulos J (2002) Towards requirements-driven information systems engineering: the Tropos project, vol 27. Elsevier Science, Information Systems, London, pp 365–389 Castroa J, Kolpb M, Mylopoulos J (2002) Towards requirements-driven information systems engineering: the Tropos project, vol 27. Elsevier Science, Information Systems, London, pp 365–389
go back to reference Chung L, Mylopoulos J, Nixon B (1992) Representing and using non-functional requirements: a process-oriented approach. IEEE Trans Softw Eng 8(6):483–497 Chung L, Mylopoulos J, Nixon B (1992) Representing and using non-functional requirements: a process-oriented approach. IEEE Trans Softw Eng 8(6):483–497
go back to reference Chung L, Nixon BA, Yu E, Mylopoulos J (1999) Non-functional requirements in software engineering, Kluwer, Boston Hardbound Chung L, Nixon BA, Yu E, Mylopoulos J (1999) Non-functional requirements in software engineering, Kluwer, Boston Hardbound
go back to reference Clements PC, Northrup LM (1996) Software architecture: an executive overview, technical report no. CMU/SEI-96-TR-003, Carnegie Mellon University, Pittsburgh Clements PC, Northrup LM (1996) Software architecture: an executive overview, technical report no. CMU/SEI-96-TR-003, Carnegie Mellon University, Pittsburgh
go back to reference Cockburn A (1998) Basic use case template, humans and technology. Technical report TR.96.03a Cockburn A (1998) Basic use case template, humans and technology. Technical report TR.96.03a
go back to reference Davis AM, Leffingwell DA (1995) Using requirements management to speed delivery of higher quality applications, Technical report 0001, rational software Davis AM, Leffingwell DA (1995) Using requirements management to speed delivery of higher quality applications, Technical report 0001, rational software
go back to reference Dobson J (1991) A methodology for analysing human computer-related issues in secure systems. In: International conference on computer security and integrity in our changing world. Espoo, Finland, pp 151–170 Dobson J (1991) A methodology for analysing human computer-related issues in secure systems. In: International conference on computer security and integrity in our changing world. Espoo, Finland, pp 151–170
go back to reference Fowler M (2004) UML Distilled, 3rd edn. Addison-Wesley, Boston Fowler M (2004) UML Distilled, 3rd edn. Addison-Wesley, Boston
go back to reference ISO/IEC 20000-1 (2005) Information technology: service management. Part 1: Specification, ISO/IEC International Standard, Geneva, Switzerland ISO/IEC 20000-1 (2005) Information technology: service management. Part 1: Specification, ISO/IEC International Standard, Geneva, Switzerland
go back to reference Jacobson I (1987) Object oriented development in an industrial environment, conference on object oriented programming systems and applications (OOPSLA ‘87): Orlando, FL, pp 183–191 Jacobson I (1987) Object oriented development in an industrial environment, conference on object oriented programming systems and applications (OOPSLA ‘87): Orlando, FL, pp 183–191
go back to reference Jacobson I (1992) Object-oriented software engineering: a use case driven approach, Addison-Wesley, Boston Jacobson I (1992) Object-oriented software engineering: a use case driven approach, Addison-Wesley, Boston
go back to reference Jacobson I (2004) Use cases: yesterday, today, and tomorrow. Softw Syst Model 3(3):210–220CrossRef Jacobson I (2004) Use cases: yesterday, today, and tomorrow. Softw Syst Model 3(3):210–220CrossRef
go back to reference Kotonya G, Sommerville I (1993) A framework for integrating functional and non-functional requirements. In: International workshop on systems engineering for real time applications, Cirencester UK, pp 148–153 Kotonya G, Sommerville I (1993) A framework for integrating functional and non-functional requirements. In: International workshop on systems engineering for real time applications, Cirencester UK, pp 148–153
go back to reference Kruchten P (1995) Architectural blueprints: the ‘4 + 1’ view model of software architecture. IEEE Softw 12(6):42–50CrossRef Kruchten P (1995) Architectural blueprints: the ‘4 + 1’ view model of software architecture. IEEE Softw 12(6):42–50CrossRef
go back to reference Kruchten P (1999) The rational unified process: an introduction. Addison-Wesley, Boston Kruchten P (1999) The rational unified process: an introduction. Addison-Wesley, Boston
go back to reference Laibinis L, Troubitsyna E (2005) Fault tolerance in use-case modeling. In: Proceedings 4th international workshop on requirements for high assurance systems (RHAS’05 ), Paris, France Laibinis L, Troubitsyna E (2005) Fault tolerance in use-case modeling. In: Proceedings 4th international workshop on requirements for high assurance systems (RHAS’05 ), Paris, France
go back to reference Loucopoulos P, Karakostas V (1995) Systems requirements engineering. McGraw-Hill, UK Loucopoulos P, Karakostas V (1995) Systems requirements engineering. McGraw-Hill, UK
go back to reference McDermott J, Fox C (1999) Using abuse case models for security requirements analysis. In: Proceedings of 15th annual computer security applications conference (ACSAC ‘99), Scottsdale USA, p 55 McDermott J, Fox C (1999) Using abuse case models for security requirements analysis. In: Proceedings of 15th annual computer security applications conference (ACSAC ‘99), Scottsdale USA, p 55
go back to reference OMG (2002) UML profile for schedulability, performance and time, Object Management Group OMG (2002) UML profile for schedulability, performance and time, Object Management Group
go back to reference Rumbaugh J, Jacobson I, Booch G (2005) The unified modelling language reference manual, 2nd edn. Addison-Wesley, Boston Rumbaugh J, Jacobson I, Booch G (2005) The unified modelling language reference manual, 2nd edn. Addison-Wesley, Boston
go back to reference Saleh K, Al-Zarouni A (2004) Capturing non-functional software requirements using the user requirements notation. The 2004 international research conference on innovations in information technology (IIT2004), Dubai, UAE Saleh K, Al-Zarouni A (2004) Capturing non-functional software requirements using the user requirements notation. The 2004 international research conference on innovations in information technology (IIT2004), Dubai, UAE
go back to reference Schneider G, Winters JP (2001) Applying use cases: a practical guide, 2nd edn. Addison-Wesley, Boston Schneider G, Winters JP (2001) Applying use cases: a practical guide, 2nd edn. Addison-Wesley, Boston
go back to reference Sindre G, Opdahl A (2000) Eliciting security requirements by misuse cases. In: Proceedings of the 37th technology of object-oriented languages and systems (TOOLS–37 Pacific 2000). Sydney, Australia, pp 120–131 Sindre G, Opdahl A (2000) Eliciting security requirements by misuse cases. In: Proceedings of the 37th technology of object-oriented languages and systems (TOOLS–37 Pacific 2000). Sydney, Australia, pp 120–131
go back to reference Smith CU, Williams LG (2001) Performance solutions: a practical guide to creating responsive, scalable software, 1st edn. Addison-Wesley, Boston Smith CU, Williams LG (2001) Performance solutions: a practical guide to creating responsive, scalable software, 1st edn. Addison-Wesley, Boston
go back to reference Stoneburner G, Goguen A, Feringa A (2002) Risk management guide for information technology systems, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Publication 800–300 Stoneburner G, Goguen A, Feringa A (2002) Risk management guide for information technology systems, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Publication 800–300
go back to reference Teeuw WB, Van den Berg H (1997) On the quality of conceptual models. In: Proceedings of 16th international conference on conceptual modeling (ER’97), Los Angeles, USA Teeuw WB, Van den Berg H (1997) On the quality of conceptual models. In: Proceedings of 16th international conference on conceptual modeling (ER’97), Los Angeles, USA
go back to reference Tran Q, Chung L (1999) Tool support for dealing with non-functional requirements. In: Proceedings of IEEE ASSET ‘99, Dallas, TX, pp 86–96 Tran Q, Chung L (1999) Tool support for dealing with non-functional requirements. In: Proceedings of IEEE ASSET ‘99, Dallas, TX, pp 86–96
go back to reference Warmer J, Kleppe A (1999) The object constraint language: precise modelling with UML. Addison-Wesley, Boston Warmer J, Kleppe A (1999) The object constraint language: precise modelling with UML. Addison-Wesley, Boston
go back to reference Wieringa RJ (2003) Design methods for reactive systems: Yourdon, Statemate and the UML. Morgan Kaufmann, San Francisco Wieringa RJ (2003) Design methods for reactive systems: Yourdon, Statemate and the UML. Morgan Kaufmann, San Francisco
go back to reference Xu L, Ziv H, Richardson D, Liu Z (2005) Towards modeling non-functional requirements in software architecture. In: Proceedings of Early Aspects 2005: Aspect-oriented requirements engineering and architecture design workshop, Chicago, IL, USA Xu L, Ziv H, Richardson D, Liu Z (2005) Towards modeling non-functional requirements in software architecture. In: Proceedings of Early Aspects 2005: Aspect-oriented requirements engineering and architecture design workshop, Chicago, IL, USA
go back to reference Youngs R, Redmond-Pyle D, Spaas P, Kahan E (1999) A standard for architecture description. IBM Syst J 38(1):32–50CrossRef Youngs R, Redmond-Pyle D, Spaas P, Kahan E (1999) A standard for architecture description. IBM Syst J 38(1):32–50CrossRef
go back to reference Zhou X, Tsai WT, Wei X, Chen Y, Xiao B (2006) Pi4SOA: A policy infrastructure for verification and control of service collaboration, IEEE international conference on e-business engineering (ICEBE ‘06), Shanghai, China, pp 307–314 Zhou X, Tsai WT, Wei X, Chen Y, Xiao B (2006) Pi4SOA: A policy infrastructure for verification and control of service collaboration, IEEE international conference on e-business engineering (ICEBE ‘06), Shanghai, China, pp 307–314
go back to reference Zou J, Pavlovski CJ (2006) Modeling architectural non functional requirements: from use case to control case. IEEE international conference on e-business engineering (ICEBE ‘06), Shanghai, China, pp 315–322 Zou J, Pavlovski CJ (2006) Modeling architectural non functional requirements: from use case to control case. IEEE international conference on e-business engineering (ICEBE ‘06), Shanghai, China, pp 315–322
Metadata
Title
Control case approach to record and model non-functional requirements
Authors
Joe Zou
Christopher J. Pavlovski
Publication date
01-01-2008
Publisher
Springer-Verlag
Published in
Information Systems and e-Business Management / Issue 1/2008
Print ISSN: 1617-9846
Electronic ISSN: 1617-9854
DOI
https://doi.org/10.1007/s10257-007-0057-x

Other articles of this Issue 1/2008

Information Systems and e-Business Management 1/2008 Go to the issue

Premium Partner