DocumentCode :
2705643
Title :
Tracing Cross-Cutting Requirements via Context-Based Constraints
Author :
Bübl, Felix ; Balser, Michael
Author_Institution :
Imphar AG, Berlin, Germany
fYear :
2005
fDate :
21-23 March 2005
Firstpage :
80
Lastpage :
90
Abstract :
In complex systems, it is difficult to identify which system element is involved in which requirement. In this article, we present a new approach for expressing and validating a requirement even if we don’t precisely know which system elements are involved: a context-based constraint (CoCon) can identify the involved elements according to their context. CoCons support checking the system for compliance with requirements during (re-)design, during (re-)configuration or at runtime because they specify requirements on an abstract level independent of the monitored artefact type. They facilitate handling cross-cutting requirements for possibly large, overlapping or dynamically changing sets of system elements - even across different artefact types or platforms. Besides defining CoCons, we discuss algorithms for detecting violated or contradicting CoCons.
Keywords :
data integrity; formal specification; formal verification; context-based constraints; contradicted CoCons detection; cross-cutting security requirement tracing; requirement specification; requirement validation; violated CoCons detection; Computer networks; Data privacy; Data security; Documentation; Monitoring; Runtime; Software design; Software maintenance; Software systems; Unified modeling language;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Maintenance and Reengineering, 2005. CSMR 2005. Ninth European Conference on
ISSN :
1534-5351
Print_ISBN :
0-7695-2304-8
Type :
conf
DOI :
10.1109/CSMR.2005.54
Filename :
1402117
Link To Document :
بازگشت