Requirements engineering within a large-scale security-oriented research project: lessons learned

被引:4
作者
Gurses, Seda [1 ,2 ]
Seguran, Magali [3 ]
Zannone, Nicola [4 ]
机构
[1] Katholieke Univ Leuven, ESAT COSIC, Louvain, Belgium
[2] Katholieke Univ Leuven, IBBT, Louvain, Belgium
[3] SAP Res, Sophia Antipolis, France
[4] Eindhoven Univ Technol, NL-5600 MB Eindhoven, Netherlands
关键词
Requirements engineering practice; Large-scale research project; Cooperative work; Gap analysis; Interaction analysis; TROPOS; ELICITATION; METHODOLOGY; LANGUAGE; PRIVACY; MODEL;
D O I
10.1007/s00766-011-0139-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Requirements engineering has been recognized as a fundamental phase of the software engineering process. Nevertheless, the elicitation and analysis of requirements are often left aside in favor of architecture-driven software development. This tendency, however, can lead to issues that may affect the success of a project. This paper presents our experience gained in the elicitation and analysis of requirements in a large-scale security-oriented European research project, which was originally conceived as an architecture-driven project. In particular, we illustrate the challenges that can be faced in large-scale research projects and consider the applicability of existing best practices and off-the-shelf methodologies with respect to the needs of such projects. We then discuss how those practices and methods can be integrated into the requirements engineering process and possibly improved to address the identified challenges. Finally, we summarize the lessons learned from our experience and the benefits that a proper requirements analysis can bring to a project.
引用
收藏
页码:43 / 66
页数:24
相关论文
共 70 条
[1]  
Alves C., 2002, 14 INT C SOFTWARE EN, P789
[2]  
[Anonymous], 2008, 90012008 ISO
[3]  
[Anonymous], 1989, STORYBOARD PROTOTYPI
[4]   Risk as dependability metrics for the evaluation of business solutions: A model-driven approach [J].
Asnar, Yudistira ;
Moretti, Rocco ;
Sebastianis, Maurizio ;
Zannone, Nicola .
ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, :1240-+
[5]   Large-scale requirements analysis revisited: The need for understanding the political ecology of requirements engineering [J].
Bergman M. ;
King J.L. ;
Lyytinen K. .
Requirements Engineering, 2002, 7 (3) :152-171
[6]  
Blomberg J, 1993, PARTICIPATORY DESIGN, P123
[7]   Analyzing regulatory rules for privacy and security requirements [J].
Breaux, Travis D. ;
Anton, Annie I. .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2008, 34 (01) :5-20
[8]   Tropos: An agent-oriented software development methodology [J].
Bresciani, P ;
Perini, A ;
Giorgini, P ;
Giunchiglia, F ;
Mylopoulos, J .
AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS, 2004, 8 (03) :203-236
[9]   USING FOCUS GROUP METHODOLOGY FOR ERGONOMIC DESIGN [J].
CAPLAN, S .
ERGONOMICS, 1990, 33 (05) :527-533
[10]  
Carlshamre P, 2001, FIFTH IEEE INTERNATIONAL SYMPOSIUM ON REQUIREMENTS ENGINEERING, PROCEEDINGS, P84