TY - GEN
T1 - Requirements refinement and exploration of architecture for security and other NFRs
AU - Okubo, Takao
AU - Yoshioka, Nobukazu
AU - Kaiya, Haruhiko
PY - 2014
Y1 - 2014
N2 - Earlier software architecture design is essential particularly when it comes to security concerns, since security risks, requirements and architectures are all closely interrelated and interacting. We have proposed the security driven twin peaks method with a mutual refinement of the requirements, and architectures. However, there are multiple alternatives to an architecture design for initial requirements, and their choices depend on non-functional requirements (NFRs), such as security, performance, and costs which have a big impact on the quality of the software. We propose a new method called TPM-SA2 to avoid any back-track in refinement. Each architectural alternative in TPM-SA2 is refined so that it aligns with the requirements. For each refinement, the requirements can be updated vice versa. TPM-SA2 enables us to predict the impacts on the NFRs by each candidate for the architecture, and choose the most appropriate one with respect to the impact. As a result, we can define the requirements and architectures, and estimated the development costs earlier than ever.
AB - Earlier software architecture design is essential particularly when it comes to security concerns, since security risks, requirements and architectures are all closely interrelated and interacting. We have proposed the security driven twin peaks method with a mutual refinement of the requirements, and architectures. However, there are multiple alternatives to an architecture design for initial requirements, and their choices depend on non-functional requirements (NFRs), such as security, performance, and costs which have a big impact on the quality of the software. We propose a new method called TPM-SA2 to avoid any back-track in refinement. Each architectural alternative in TPM-SA2 is refined so that it aligns with the requirements. For each refinement, the requirements can be updated vice versa. TPM-SA2 enables us to predict the impacts on the NFRs by each candidate for the architecture, and choose the most appropriate one with respect to the impact. As a result, we can define the requirements and architectures, and estimated the development costs earlier than ever.
UR - http://www.scopus.com/inward/record.url?scp=84904538877&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84904538877&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:84904538877
SN - 9783319078687
T3 - Lecture Notes in Business Information Processing
SP - 286
EP - 298
BT - Advanced Information Systems Engineering Workshops - CAiSE 2014 International Workshops, Proceedings
PB - Springer Verlag
T2 - 26th International Conference on Advanced Information Systems Engineering, CAiSE 2014
Y2 - 16 June 2014 through 20 June 2014
ER -