Skip to main content
Top

2019 | OriginalPaper | Chapter

Systematic Refinement of Softgoals Using a Combination of KAOS Goal Models and Problem Diagrams

Authors : Nelufar Ulfat-Bunyadi, Nazila Gol Mohammadi, Roman Wirtz, Maritta Heisel

Published in: Software Technologies

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Softgoals are goals that do not have a clear-cut criterion for their satisfaction (in contrast to so-called hardgoals). They are considered to be satisfied when there is sufficient positive and little negative evidence for this claim. Thus, they are expected to be satisfied within acceptable limits rather than absolutely. Examples of such softgoals are quality attributes such as safety, security, and trustworthiness. In a previous paper, we showed how the systematic refinement of goals can be supported by combining KAOS goal models and problem diagrams that are created based on the Six-Variable Model. Therein, we mainly focussed on hardgoals. In this paper, we show how the systematic refinement of softgoals can be supported. We mainly focus on security as a softgoal and show how it can be refined in a systematic way. However, our method can be used in the same way to systematically decompose other softgoals as well. The benefit of our method is that it results not only in detailed security requirements but helps also in making expectations to be satisfied e.g. by sensors, actuators, other systems, and users explicit.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference van Lamsweerde, A.: Goal-oriented requirements engineering: a guided tour. In: Proceedings of RE 2001, pp. 249–263. IEEE Computer Society (2001) van Lamsweerde, A.: Goal-oriented requirements engineering: a guided tour. In: Proceedings of RE 2001, pp. 249–263. IEEE Computer Society (2001)
2.
go back to reference Mylopoulos, J., Chung, L., Yu, E.: From object-oriented to goal-oriented requirements analysis. Commun. ACM 42(1), 31–37 (1999)CrossRef Mylopoulos, J., Chung, L., Yu, E.: From object-oriented to goal-oriented requirements analysis. Commun. ACM 42(1), 31–37 (1999)CrossRef
3.
go back to reference Van Lamsweerde, A.: Requirements Engineering - From System Goals to UML Models to Software Specifications. Wiley, Hoboken (2009) Van Lamsweerde, A.: Requirements Engineering - From System Goals to UML Models to Software Specifications. Wiley, Hoboken (2009)
4.
go back to reference Ulfat-Bunyadi, N., Gol Mohammadi, N., Heisel, M.: Supporting the systematic goal refinement in KAOS using the Six-Variable Model. In: Proceedings of ICSOFT 2018, pp. 136–145 (2018) Ulfat-Bunyadi, N., Gol Mohammadi, N., Heisel, M.: Supporting the systematic goal refinement in KAOS using the Six-Variable Model. In: Proceedings of ICSOFT 2018, pp. 136–145 (2018)
5.
go back to reference Ulfat-Bunyadi, N., Meis, R., Heisel, M.: The six-variable model - context modelling enabling systematic reuse of control software. In: Proceedings of ICSOFT 2016, pp. 15–26 (2016) Ulfat-Bunyadi, N., Meis, R., Heisel, M.: The six-variable model - context modelling enabling systematic reuse of control software. In: Proceedings of ICSOFT 2016, pp. 15–26 (2016)
6.
go back to reference Jackson, M.: Problem Frames - Analysing and Structuring Software Development Problems. Addison-Wesley, Boston (2001) Jackson, M.: Problem Frames - Analysing and Structuring Software Development Problems. Addison-Wesley, Boston (2001)
7.
go back to reference Zave, P., Jackson, M.: Four dark corners of requirements engineering. ACM Trans. Softw. Eng. Methodol. 6(1), 1–30 (1997)CrossRef Zave, P., Jackson, M.: Four dark corners of requirements engineering. ACM Trans. Softw. Eng. Methodol. 6(1), 1–30 (1997)CrossRef
8.
go back to reference Parnas, D., Madey, J.: Functional documents for computer systems. Sci. Comput. Program. 25(1), 41–61 (1995)CrossRef Parnas, D., Madey, J.: Functional documents for computer systems. Sci. Comput. Program. 25(1), 41–61 (1995)CrossRef
9.
go back to reference Haley, C.B., Laney, R.C., Moffett, J.D., Nuseibeh, B.: The effect of trust assumptions on the elaboration of security requirements. In: Proceedings of RE 2004, pp. 102–111 (2004) Haley, C.B., Laney, R.C., Moffett, J.D., Nuseibeh, B.: The effect of trust assumptions on the elaboration of security requirements. In: Proceedings of RE 2004, pp. 102–111 (2004)
10.
go back to reference Wirtz, R., Heisel, M., Meis, R., Omerovic, A., Stølen, K.: Problem-based elicitation of security requirements - the ProCOR method. In: Proceedings of ENASE 2018, pp. 26–38. SciTePress (2018) Wirtz, R., Heisel, M., Meis, R., Omerovic, A., Stølen, K.: Problem-based elicitation of security requirements - the ProCOR method. In: Proceedings of ENASE 2018, pp. 26–38. SciTePress (2018)
13.
go back to reference Bleistein, S., Cox, K., Verner, J.: Requirements engineering for e-business systems: integrating Jackson problem diagrams with goal modelling and BPM. In: Proceedings of APSEC 2004, pp. 410–417. IEEE Computer Society (2004) Bleistein, S., Cox, K., Verner, J.: Requirements engineering for e-business systems: integrating Jackson problem diagrams with goal modelling and BPM. In: Proceedings of APSEC 2004, pp. 410–417. IEEE Computer Society (2004)
14.
go back to reference Mohammadi, N.G., Alebrahim, A., Weyer, T., Heisel, M., Pohl, K.: A framework for combining problem frames and goal models to support context analysis during requirements engineering. In: Cuzzocrea, A., Kittl, C., Simos, D.E., Weippl, E., Xu, L. (eds.) CD-ARES 2013. LNCS, vol. 8127, pp. 272–288. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40511-2_19CrossRef Mohammadi, N.G., Alebrahim, A., Weyer, T., Heisel, M., Pohl, K.: A framework for combining problem frames and goal models to support context analysis during requirements engineering. In: Cuzzocrea, A., Kittl, C., Simos, D.E., Weippl, E., Xu, L. (eds.) CD-ARES 2013. LNCS, vol. 8127, pp. 272–288. Springer, Heidelberg (2013). https://​doi.​org/​10.​1007/​978-3-642-40511-2_​19CrossRef
15.
go back to reference Dao, T., Lee, H., Kang, K.: Problem frames-based approach to achieving quality attributes in software product line engineering. In: Proceedings of SPLC 2011, pp. 175–180. IEEE Computer Society (2011) Dao, T., Lee, H., Kang, K.: Problem frames-based approach to achieving quality attributes in software product line engineering. In: Proceedings of SPLC 2011, pp. 175–180. IEEE Computer Society (2011)
16.
go back to reference Han, D., Xing, J., Yang, Q., Li, J., Zhang, X., Chen, Y.: Integrating goal models and problem frames for requirements analysis of self-adaptive CPS. In: Proceedings of COMPSAC 2017, pp. 529–535. IEEE Computer Society (2017) Han, D., Xing, J., Yang, Q., Li, J., Zhang, X., Chen, Y.: Integrating goal models and problem frames for requirements analysis of self-adaptive CPS. In: Proceedings of COMPSAC 2017, pp. 529–535. IEEE Computer Society (2017)
17.
go back to reference Elahi, G., Yu, E.: Trust trade-off analysis for security requirements engineering. In: Proceedings of RE 2009, pp. 243–248 (2009) Elahi, G., Yu, E.: Trust trade-off analysis for security requirements engineering. In: Proceedings of RE 2009, pp. 243–248 (2009)
18.
go back to reference Giorgini, P., Mouratidis, H.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. 17(2), 285–309 (2007)CrossRef Giorgini, P., Mouratidis, H.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. 17(2), 285–309 (2007)CrossRef
19.
go back to reference Meland, P., Paja, E., Gjære, E., Paul, S., Dalpiaz, F., Giorgini, P.: Threat analysis in goal-oriented security requirements modelling. Int. J. Secur. Softw. Eng. 5(2), 1–19 (2014)CrossRef Meland, P., Paja, E., Gjære, E., Paul, S., Dalpiaz, F., Giorgini, P.: Threat analysis in goal-oriented security requirements modelling. Int. J. Secur. Softw. Eng. 5(2), 1–19 (2014)CrossRef
20.
go back to reference Faßbender, S., Heisel, M., Meis, R.: Functional requirements under security PresSuRE. In: Proceedings of ICSOFT-PT 2014, pp. 5–16 (2014) Faßbender, S., Heisel, M., Meis, R.: Functional requirements under security PresSuRE. In: Proceedings of ICSOFT-PT 2014, pp. 5–16 (2014)
21.
go back to reference Lin, L., Nuseibeh, B., Ince, D.C., Jackson, M., Moffett, J.D.: Analysing security threats and vulnerabilities using abuse frames. Technical Report No. 2003/10, October 2003, The Open University, United Kingdom (2003) Lin, L., Nuseibeh, B., Ince, D.C., Jackson, M., Moffett, J.D.: Analysing security threats and vulnerabilities using abuse frames. Technical Report No. 2003/10, October 2003, The Open University, United Kingdom (2003)
22.
go back to reference Haley, C., Laney, R., Moffett, J., Nuseibeh, B.: Security requirements engineering: a framework for representation and analysis. IEEE Trans. Softw. Eng. 34(1), 133–153 (2008)CrossRef Haley, C., Laney, R., Moffett, J., Nuseibeh, B.: Security requirements engineering: a framework for representation and analysis. IEEE Trans. Softw. Eng. 34(1), 133–153 (2008)CrossRef
Metadata
Title
Systematic Refinement of Softgoals Using a Combination of KAOS Goal Models and Problem Diagrams
Authors
Nelufar Ulfat-Bunyadi
Nazila Gol Mohammadi
Roman Wirtz
Maritta Heisel
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-29157-0_7

Premium Partner