Assumption-based risk identification method (ARM) in dynamic service provisioning

A. Zarghami, Eelco Vriezekolk, M. Eslami, M. V. Sinderen, R. Wieringa
{"title":"Assumption-based risk identification method (ARM) in dynamic service provisioning","authors":"A. Zarghami, Eelco Vriezekolk, M. Eslami, M. V. Sinderen, R. Wieringa","doi":"10.1109/RE.2013.6636717","DOIUrl":null,"url":null,"abstract":"In this paper we consider service-oriented applications composed of component services provided by different, economically independent service providers. As in all composite applications, the component services are composed and configured to meet requirements for the composite application. However, in a field experiment of composite service-oriented applications wef found that, although the services as actually delivered by the service providers meet their requirements, there is still a mismatch across service providers due to unstated assumptions, and that this mismatch causes an incorrect composite application to be delivered to end-users. Identifying and analyzing these initially unstated assumptions turns requirements engineering for service-oriented applications into risk analysis. In this paper, we describe a field experiment with an experimental service-oriented homecare system, in which unexpected behavior of the system turned up unstated assumptions about the contributing service providers. We then present an assumptions-driven risk identification method that can help identifying these risks, and we show how we applied this method in the second iteration of the field experiment. The method adapts some techniques from problem frame diagrams to identify relevant assumptions on service providers. The method is informal, and takes the “view from nowhere” in that it does not result in a specification of the component services, but for every component service delivers a set of assumptions that the service must satisfy in order to contribute to the overall system requirements. We end the paper with a discussion of generalizability of this method.","PeriodicalId":6342,"journal":{"name":"2013 21st IEEE International Requirements Engineering Conference (RE)","volume":"28 1","pages":"175-184"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 21st IEEE International Requirements Engineering Conference (RE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RE.2013.6636717","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

In this paper we consider service-oriented applications composed of component services provided by different, economically independent service providers. As in all composite applications, the component services are composed and configured to meet requirements for the composite application. However, in a field experiment of composite service-oriented applications wef found that, although the services as actually delivered by the service providers meet their requirements, there is still a mismatch across service providers due to unstated assumptions, and that this mismatch causes an incorrect composite application to be delivered to end-users. Identifying and analyzing these initially unstated assumptions turns requirements engineering for service-oriented applications into risk analysis. In this paper, we describe a field experiment with an experimental service-oriented homecare system, in which unexpected behavior of the system turned up unstated assumptions about the contributing service providers. We then present an assumptions-driven risk identification method that can help identifying these risks, and we show how we applied this method in the second iteration of the field experiment. The method adapts some techniques from problem frame diagrams to identify relevant assumptions on service providers. The method is informal, and takes the “view from nowhere” in that it does not result in a specification of the component services, but for every component service delivers a set of assumptions that the service must satisfy in order to contribute to the overall system requirements. We end the paper with a discussion of generalizability of this method.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
动态业务发放中基于假设的风险识别方法
在本文中,我们考虑由不同的、经济上独立的服务提供者提供的组件服务组成的面向服务的应用程序。与所有组合应用程序一样,组件服务被组合和配置为满足组合应用程序的需求。然而,在组合面向服务的应用程序的现场实验中,wef发现,尽管服务提供者实际交付的服务满足了它们的需求,但由于未声明的假设,服务提供者之间仍然存在不匹配,并且这种不匹配导致向最终用户交付了不正确的组合应用程序。识别和分析这些最初未陈述的假设,将面向服务的应用程序的需求工程转变为风险分析。在本文中,我们描述了一个面向服务的实验性家庭护理系统的现场实验,其中系统的意外行为导致了关于贡献服务提供者的未陈述假设。然后,我们提出了一种假设驱动的风险识别方法,可以帮助识别这些风险,并展示了我们如何在现场实验的第二次迭代中应用这种方法。该方法采用问题框架图中的一些技术来识别服务提供者的相关假设。该方法是非正式的,并且采用“无中生有的观点”,因为它不会产生组件服务的规范,但是对于每个组件服务提供了一组假设,服务必须满足这些假设,以便为整个系统需求做出贡献。最后讨论了该方法的可推广性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Using defect taxonomies for requirements validation in industrial projects A tool implementation of the unified requirements modeling language as enterprise architect add-in Challenges in balancing the amount of solution information in requirement specifications for embedded products Requirements reviews revisited: Residual challenges and open research questions Identifying top challenges for international research on requirements engineering for systems of systems engineering
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1