Requirements refinement and exploration of architecture for security and other NFRs

Takao Okubo, Nobukazu Yoshioka, Haruhiko Kaiya

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Earlier software architecture design is essential particularly when it comes to security concerns, since security risks, requirements and architectures are all closely interrelated and interacting. We have proposed the security driven twin peaks method with a mutual refinement of the requirements, and architectures. However, there are multiple alternatives to an architecture design for initial requirements, and their choices depend on non-functional requirements (NFRs), such as security, performance, and costs which have a big impact on the quality of the software. We propose a new method called TPM-SA2 to avoid any back-track in refinement. Each architectural alternative in TPM-SA2 is refined so that it aligns with the requirements. For each refinement, the requirements can be updated vice versa. TPM-SA2 enables us to predict the impacts on the NFRs by each candidate for the architecture, and choose the most appropriate one with respect to the impact. As a result, we can define the requirements and architectures, and estimated the development costs earlier than ever.

Original languageEnglish
Title of host publicationAdvanced Information Systems Engineering Workshops - CAiSE 2014 International Workshops, Proceedings
PublisherSpringer Verlag
Pages286-298
Number of pages13
ISBN (Print)9783319078687
Publication statusPublished - 2014
Externally publishedYes
Event26th International Conference on Advanced Information Systems Engineering, CAiSE 2014 - Thessaloniki, Greece
Duration: 2014 Jun 162014 Jun 20

Publication series

NameLecture Notes in Business Information Processing
Volume178 LNBIP
ISSN (Print)1865-1348

Conference

Conference26th International Conference on Advanced Information Systems Engineering, CAiSE 2014
Country/TerritoryGreece
CityThessaloniki
Period14/6/1614/6/20

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Management Information Systems
  • Business and International Management
  • Information Systems
  • Modelling and Simulation
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Requirements refinement and exploration of architecture for security and other NFRs'. Together they form a unique fingerprint.

Cite this