Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns

T. Breaux, Hanan Hibshi, Ashwini Rao, Jean-Michel Lehker
{"title":"Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns","authors":"T. Breaux, Hanan Hibshi, Ashwini Rao, Jean-Michel Lehker","doi":"10.1109/RePa.2012.6359975","DOIUrl":null,"url":null,"abstract":"Despite the abundance of information security guidelines, system developers have difficulties implementing technical solutions that are reasonably secure. Security patterns are one possible solution to help developers reuse security knowledge. The challenge is that it takes experts to develop security patterns. To address this challenge, we need a framework to identify and assess patterns and pattern application practices that are accessible to non-experts. In this paper, we narrowly define what we mean by patterns by focusing on requirements patterns and the considerations that may inform how we identify and validate patterns for knowledge reuse. We motivate this discussion using examples from the requirements pattern literature and theory in cognitive psychology.","PeriodicalId":255558,"journal":{"name":"2012 Second IEEE International Workshop on Requirements Patterns (RePa)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Second IEEE International Workshop on Requirements Patterns (RePa)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RePa.2012.6359975","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Despite the abundance of information security guidelines, system developers have difficulties implementing technical solutions that are reasonably secure. Security patterns are one possible solution to help developers reuse security knowledge. The challenge is that it takes experts to develop security patterns. To address this challenge, we need a framework to identify and assess patterns and pattern application practices that are accessible to non-experts. In this paper, we narrowly define what we mean by patterns by focusing on requirements patterns and the considerations that may inform how we identify and validate patterns for knowledge reuse. We motivate this discussion using examples from the requirements pattern literature and theory in cognitive psychology.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
走向模式实验的框架:理解需求工程模式的经验有效性
尽管有大量的信息安全指导方针,系统开发人员在实现合理安全的技术解决方案方面存在困难。安全模式是帮助开发人员重用安全知识的一种可能的解决方案。挑战在于需要专家来开发安全模式。为了应对这一挑战,我们需要一个框架来识别和评估非专家可以访问的模式和模式应用程序实践。在本文中,我们通过关注需求模式和可能告知我们如何识别和验证知识重用模式的考虑因素,狭义地定义了我们所说的模式。我们用认知心理学中的需求模式文献和理论中的例子来激发这个讨论。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Early security patterns: A collection of constraints to describe regulatory security requirements Towards trust-based software requirement patterns Requirements patterns for seismology software applications Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns Pattern-based security requirements specification using ontologies and boilerplates
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1