首页 > 最新文献

2015 IEEE 23rd International Requirements Engineering Conference (RE)最新文献

英文 中文
Experience requirements in video games definition and testability 在电子游戏定义和测试方面的经验要求
Pub Date : 2015-08-01 DOI: 10.1109/RE.2015.7320449
David Callele, Philip Dueck, K. Wnuk, Peitsa Hynninen
A properly formed requirement is testable, a necessity for ensuring that design goals are met. While challenging in productivity applications, entertainment applications such as games compound the problem due to their subjective nature. We report here on our efforts to create testable experience requirements, the associated scope challenges and challenges with test design and result interpretation. We further report on issues experienced when performing focus group testing and provide practitioner guidance.
适当形成的需求是可测试的,是确保满足设计目标的必要条件。虽然在生产力应用程序中具有挑战性,但娱乐应用程序(如游戏)由于其主观性质而使问题复杂化。我们在这里报告我们为创建可测试的体验需求所做的努力,以及与测试设计和结果解释相关的范围挑战和挑战。我们进一步报告了当进行焦点小组测试时遇到的问题,并提供从业者指导。
{"title":"Experience requirements in video games definition and testability","authors":"David Callele, Philip Dueck, K. Wnuk, Peitsa Hynninen","doi":"10.1109/RE.2015.7320449","DOIUrl":"https://doi.org/10.1109/RE.2015.7320449","url":null,"abstract":"A properly formed requirement is testable, a necessity for ensuring that design goals are met. While challenging in productivity applications, entertainment applications such as games compound the problem due to their subjective nature. We report here on our efforts to create testable experience requirements, the associated scope challenges and challenges with test design and result interpretation. We further report on issues experienced when performing focus group testing and provide practitioner guidance.","PeriodicalId":132568,"journal":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","volume":"8 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125754857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Trace links explained: An automated approach for generating rationales 跟踪链接解释:用于生成基本原理的自动化方法
Pub Date : 2015-08-01 DOI: 10.1109/RE.2015.7320423
Jin Guo, Natawut Monaikul, J. Cleland-Huang
Software Traceability is a critical element in all safety critical software systems. Trace links are created across diverse artifacts such as requirements, design, code, test cases, and hazards - either manually or with the help of supporting tools. The links are then used to support a range of software engineering activities including impact analysis, compliance verification, and safety inspections. For traceability to effectively support these activities it is important for the meaning and rationale of each link to be clearly communicated. It is often insuficient to know that one artifact satisfies, realizes, or complies to another. Instead, it is important to know why and how it does so. Terms and phrases used to describe artifacts are connected through composition, synonymic, and generalization relationships which often can only be interpreted by domain experts. In this RE:Next! paper we propose a novel approach for utilizing domain-specific knowledge bases to generate trace link rationales. We illustrate our approach with examples of automatically generated rationales taken from the domain of Communication and Control of a Transportation system, and from a Medical Infusion pump domain.
软件可追溯性是所有安全关键软件系统的关键要素。跟踪链接是在不同的工件(如需求、设计、代码、测试用例和危险)之间创建的——可以手工创建,也可以在支持工具的帮助下创建。然后使用这些链接来支持一系列软件工程活动,包括影响分析、遵从性验证和安全检查。为了有效地支持这些活动的可追溯性,清楚地传达每个链接的含义和基本原理是很重要的。知道一个工件满足、实现或遵从另一个工件通常是不够的。相反,重要的是要知道它为什么以及如何做到这一点。用于描述工件的术语和短语通过组合、同义词和泛化关系连接在一起,这些关系通常只能由领域专家解释。在这个RE:下一个!本文提出了一种利用特定领域知识库生成跟踪链路原理的新方法。我们用自动生成的原理的例子来说明我们的方法,这些原理取自交通系统的通信和控制领域,以及医疗输液泵领域。
{"title":"Trace links explained: An automated approach for generating rationales","authors":"Jin Guo, Natawut Monaikul, J. Cleland-Huang","doi":"10.1109/RE.2015.7320423","DOIUrl":"https://doi.org/10.1109/RE.2015.7320423","url":null,"abstract":"Software Traceability is a critical element in all safety critical software systems. Trace links are created across diverse artifacts such as requirements, design, code, test cases, and hazards - either manually or with the help of supporting tools. The links are then used to support a range of software engineering activities including impact analysis, compliance verification, and safety inspections. For traceability to effectively support these activities it is important for the meaning and rationale of each link to be clearly communicated. It is often insuficient to know that one artifact satisfies, realizes, or complies to another. Instead, it is important to know why and how it does so. Terms and phrases used to describe artifacts are connected through composition, synonymic, and generalization relationships which often can only be interpreted by domain experts. In this RE:Next! paper we propose a novel approach for utilizing domain-specific knowledge bases to generate trace link rationales. We illustrate our approach with examples of automatically generated rationales taken from the domain of Communication and Control of a Transportation system, and from a Medical Infusion pump domain.","PeriodicalId":132568,"journal":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","volume":"10 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114132321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Goals at risk? Machine learning at support of early assessment 目标面临风险?机器学习支持早期评估
Pub Date : 2015-08-01 DOI: 10.1109/RE.2015.7320432
P. Avesani, A. Perini, A. Siena, A. Susi
A relevant activity in the requirements engineering process consists in the identification, assessment and management of potential risks, which can prevent the system-to-be from meeting stakeholder needs. However, risk analysis techniques are often time- and resource- consuming activities, which may introduce in the requirements engineering process a significant overhead. To overcome this problem, we aim at supporting risk management activity in a semi-automated way, merging the capability to exploit existing risk-related information potentially present in a given organisation, with an automated ranking of the goals with respect to the level of risk the decision-maker estimates for them. In particular, this paper proposes an approach to address the general problem of risk decision-making, which combines knowledge about risks assessment techniques and Machine Learning to enable an active intervention of human evaluators in the decision process, learning from their feedback and integrating it with the organisational knowledge. The long term objective is that of improving the capacity of an organisation to be aware and to manage risks, by introducing new techniques in the field of risk management that are able to interactively and continuously extract useful knowledge from the organisation domain and from the decision-maker expertise.
需求工程过程中的相关活动包括潜在风险的识别、评估和管理,这可能会阻止系统满足涉众的需求。然而,风险分析技术通常是时间和资源消耗的活动,这可能会在需求工程过程中引入一个重要的开销。为了克服这个问题,我们的目标是以半自动化的方式支持风险管理活动,合并利用给定组织中潜在存在的现有风险相关信息的能力,并根据决策者估计的风险水平对目标进行自动排名。特别是,本文提出了一种方法来解决风险决策的一般问题,它结合了风险评估技术和机器学习的知识,使人类评估者能够在决策过程中积极干预,从他们的反馈中学习,并将其与组织知识相结合。长期目标是提高组织意识和管理风险的能力,通过引入风险管理领域的新技术,能够从组织领域和决策者的专业知识中交互和持续地提取有用的知识。
{"title":"Goals at risk? Machine learning at support of early assessment","authors":"P. Avesani, A. Perini, A. Siena, A. Susi","doi":"10.1109/RE.2015.7320432","DOIUrl":"https://doi.org/10.1109/RE.2015.7320432","url":null,"abstract":"A relevant activity in the requirements engineering process consists in the identification, assessment and management of potential risks, which can prevent the system-to-be from meeting stakeholder needs. However, risk analysis techniques are often time- and resource- consuming activities, which may introduce in the requirements engineering process a significant overhead. To overcome this problem, we aim at supporting risk management activity in a semi-automated way, merging the capability to exploit existing risk-related information potentially present in a given organisation, with an automated ranking of the goals with respect to the level of risk the decision-maker estimates for them. In particular, this paper proposes an approach to address the general problem of risk decision-making, which combines knowledge about risks assessment techniques and Machine Learning to enable an active intervention of human evaluators in the decision process, learning from their feedback and integrating it with the organisational knowledge. The long term objective is that of improving the capacity of an organisation to be aware and to manage risks, by introducing new techniques in the field of risk management that are able to interactively and continuously extract useful knowledge from the organisation domain and from the decision-maker expertise.","PeriodicalId":132568,"journal":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121704790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Supporting quantitative assessment of requirements in Goal Orientation 支持目标导向需求的定量评估
Pub Date : 2015-08-01 DOI: 10.1109/RE.2015.7320443
Robert Darimont, C. Ponsard
Goal-Orientation provides a rich framework for reasoning about systems during the Requirements Engineering (RE) phase. While critical properties like safety or security can require formal semantics, performing quantitative reasoning on semi-formal models in a much more lightweight approach reveals to be sufficient in many projects. Most of the time, existing RE tools only target specific quantification scenarios or do not provide easy mechanisms for implementing them. In order to demonstrate the ability to provide mechanisms that are both generic and powerful, we developed an extension of the Objectiver tool in three directions: (1) internal reasoning capabilities on AND-OR goal/obstacles structures, (2) close integration with an external spreadsheet application and (3) model export for building assessment tools using model-driven engineering techniques. We also demonstrate how our approach can cope with a variety of industrial scenarios requiring some form of quantification such as risk analysis, selection of design alternatives, effort estimation, and assessment of customer satisfaction.
面向目标为需求工程(RE)阶段的系统推理提供了丰富的框架。虽然像安全性或安全性这样的关键属性可能需要形式化语义,但在许多项目中,以更轻量级的方法对半形式化模型执行定量推理就足够了。大多数时候,现有的可重构工具只针对特定的量化场景,或者不提供实现它们的简单机制。为了展示提供既通用又强大的机制的能力,我们在三个方向上开发了Objectiver工具的扩展:(1)对and - or目标/障碍结构的内部推理能力,(2)与外部电子表格应用程序的紧密集成,以及(3)使用模型驱动工程技术构建评估工具的模型导出。我们还演示了我们的方法如何处理各种需要某种形式的量化的工业场景,例如风险分析、设计替代方案的选择、工作量估计和客户满意度的评估。
{"title":"Supporting quantitative assessment of requirements in Goal Orientation","authors":"Robert Darimont, C. Ponsard","doi":"10.1109/RE.2015.7320443","DOIUrl":"https://doi.org/10.1109/RE.2015.7320443","url":null,"abstract":"Goal-Orientation provides a rich framework for reasoning about systems during the Requirements Engineering (RE) phase. While critical properties like safety or security can require formal semantics, performing quantitative reasoning on semi-formal models in a much more lightweight approach reveals to be sufficient in many projects. Most of the time, existing RE tools only target specific quantification scenarios or do not provide easy mechanisms for implementing them. In order to demonstrate the ability to provide mechanisms that are both generic and powerful, we developed an extension of the Objectiver tool in three directions: (1) internal reasoning capabilities on AND-OR goal/obstacles structures, (2) close integration with an external spreadsheet application and (3) model export for building assessment tools using model-driven engineering techniques. We also demonstrate how our approach can cope with a variety of industrial scenarios requiring some form of quantification such as risk analysis, selection of design alternatives, effort estimation, and assessment of customer satisfaction.","PeriodicalId":132568,"journal":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133722071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Rationalization of goal models in GRL using formal argumentation 用形式论证对GRL中目标模型进行合理化
Pub Date : 2015-08-01 DOI: 10.1109/RE.2015.7320426
Marc van Zee, Floris Bex, S. Ghanavati
We apply an existing formal framework for practical reasoning with arguments and evidence to the Goal-oriented Requirements Language (GRL), which is part of the User Requirements Notation (URN). This formal framework serves as a rationalization for elements in a GRL model: using attack relations between arguments we can automatically compute the acceptability status of elements in a GRL model, based on the acceptability status of their underlying arguments and the evidence. We integrate the formal framework into the GRL metamodel and we set out a research to further develop this framework.
我们将一个现有的形式化框架应用到面向目标的需求语言(GRL)中,用于论证和证据的实际推理,GRL是用户需求符号(URN)的一部分。这个形式化框架作为GRL模型中元素的合理化:使用参数之间的攻击关系,我们可以根据其底层参数和证据的可接受状态自动计算GRL模型中元素的可接受状态。我们将正式框架集成到GRL元模型中,并着手研究进一步开发该框架。
{"title":"Rationalization of goal models in GRL using formal argumentation","authors":"Marc van Zee, Floris Bex, S. Ghanavati","doi":"10.1109/RE.2015.7320426","DOIUrl":"https://doi.org/10.1109/RE.2015.7320426","url":null,"abstract":"We apply an existing formal framework for practical reasoning with arguments and evidence to the Goal-oriented Requirements Language (GRL), which is part of the User Requirements Notation (URN). This formal framework serves as a rationalization for elements in a GRL model: using attack relations between arguments we can automatically compute the acceptability status of elements in a GRL model, based on the acceptability status of their underlying arguments and the evidence. We integrate the formal framework into the GRL metamodel and we set out a research to further develop this framework.","PeriodicalId":132568,"journal":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132875948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
An environment-driven ontological approach to requirements elicitation for safety-critical systems 对安全关键系统的需求引出的环境驱动的本体论方法
Pub Date : 2015-08-01 DOI: 10.1109/RE.2015.7320431
Jiale Zhou, Kaj Hänninen, K. Lundqvist, Yue Lu, Luciana Provenzano, K. Forsberg
The environment, where a safety critical system (SCS) operates, is an important source from which safety requirements of the SCS can originate. By treating the system under construction as a black box, the environment is typically documented as a number of assumptions, based on which a set of environmental safety requirements will be elicited. However, it is not a trivial task in practice to capture the environmental assumptions to elicit safety requirements. The lack of certain assumptions or too strict assumptions will either result in incomplete environmental safety requirements or waste many efforts on eliciting incorrect requirements. Moreover, the variety of operating environment for an SCS will further complicate the task, since the captured assumptions are at risk of invalidity, and consequently the elicited requirements need to be revisited to ensure safety has not been compromised by the change. This short paper presents an on-going work aiming to 1) systematically organize the knowledge of system operating environment and, 2) facilitate the elicitation of environmental safety requirements. We propose an ontological approach to achieve the objectives. In particular, we utilize conceptual ontologies to organize the environment knowledge in terms of relevant environment concepts, relations among them and axioms. Environmental assumptions are captured by instantiating the environment ontology. An ontological reasoning mechanism is also provided to support elicitation of safety requirements from the captured assumptions.
安全关键系统(SCS)运行的环境是安全关键系统安全要求的重要来源。通过将正在构建的系统视为一个黑盒,环境通常被记录为许多假设,基于这些假设,将引出一组环境安全需求。然而,在实践中,捕捉环境假设以引出安全要求并不是一项微不足道的任务。缺乏一定的假设或过于严格的假设,要么会导致不完整的环境安全要求,要么会浪费大量的精力来引出不正确的要求。此外,SCS的各种操作环境将使任务进一步复杂化,因为捕获的假设存在无效的风险,因此需要重新审视所引出的要求,以确保安全不会因变化而受到损害。这篇短文介绍了一项正在进行的工作,旨在1)系统地组织系统运行环境的知识,2)促进环境安全要求的引出。我们提出了一种本体论的方法来实现这些目标。特别是,我们利用概念本体根据相关的环境概念、它们之间的关系和公理来组织环境知识。通过实例化环境本体来捕获环境假设。还提供了一个本体论推理机制,以支持从捕获的假设中引出安全需求。
{"title":"An environment-driven ontological approach to requirements elicitation for safety-critical systems","authors":"Jiale Zhou, Kaj Hänninen, K. Lundqvist, Yue Lu, Luciana Provenzano, K. Forsberg","doi":"10.1109/RE.2015.7320431","DOIUrl":"https://doi.org/10.1109/RE.2015.7320431","url":null,"abstract":"The environment, where a safety critical system (SCS) operates, is an important source from which safety requirements of the SCS can originate. By treating the system under construction as a black box, the environment is typically documented as a number of assumptions, based on which a set of environmental safety requirements will be elicited. However, it is not a trivial task in practice to capture the environmental assumptions to elicit safety requirements. The lack of certain assumptions or too strict assumptions will either result in incomplete environmental safety requirements or waste many efforts on eliciting incorrect requirements. Moreover, the variety of operating environment for an SCS will further complicate the task, since the captured assumptions are at risk of invalidity, and consequently the elicited requirements need to be revisited to ensure safety has not been compromised by the change. This short paper presents an on-going work aiming to 1) systematically organize the knowledge of system operating environment and, 2) facilitate the elicitation of environmental safety requirements. We propose an ontological approach to achieve the objectives. In particular, we utilize conceptual ontologies to organize the environment knowledge in terms of relevant environment concepts, relations among them and axioms. Environmental assumptions are captured by instantiating the environment ontology. An ontological reasoning mechanism is also provided to support elicitation of safety requirements from the captured assumptions.","PeriodicalId":132568,"journal":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133183000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using the requirements specification to infer the implicit test status of requirements 使用需求规范来推断需求的隐式测试状态
Pub Date : 2015-08-01 DOI: 10.1109/RE.2015.7320453
Tobias Morciniec, A. Podelski
We investigate a method to infer the implicit test status of requirements and thus increase the number of requirements for which the test status is known. The general idea is to improve the data set for measuring the maturity of the system in the current release. The inference is based on the structuring mechanisms (hierarchy, types) which are typically used to document the (natural language) requirements specification. We present a case study in the context of the development process for Mercedes-Benz passenger cars at Daimler AG. The results of the case study indicate the usefulness of the structuring mechanisms in the requirements specification as the basis for the inference. In particular, the number of requirements for which the status is known could be increased by almost a third.
我们研究了一种方法来推断需求的隐式测试状态,从而增加测试状态已知的需求数量。一般的想法是在当前版本中改进用于度量系统成熟度的数据集。推理基于结构化机制(层次结构、类型),这些机制通常用于记录(自然语言)需求规范。我们在戴姆勒公司梅赛德斯-奔驰乘用车开发过程的背景下提出了一个案例研究。案例研究的结果表明,需求规范中的结构化机制作为推理的基础是有用的。特别是,已知地位的需求数量可能增加近三分之一。
{"title":"Using the requirements specification to infer the implicit test status of requirements","authors":"Tobias Morciniec, A. Podelski","doi":"10.1109/RE.2015.7320453","DOIUrl":"https://doi.org/10.1109/RE.2015.7320453","url":null,"abstract":"We investigate a method to infer the implicit test status of requirements and thus increase the number of requirements for which the test status is known. The general idea is to improve the data set for measuring the maturity of the system in the current release. The inference is based on the structuring mechanisms (hierarchy, types) which are typically used to document the (natural language) requirements specification. We present a case study in the context of the development process for Mercedes-Benz passenger cars at Daimler AG. The results of the case study indicate the usefulness of the structuring mechanisms in the requirements specification as the basis for the inference. In particular, the number of requirements for which the status is known could be increased by almost a third.","PeriodicalId":132568,"journal":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122163803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Holistic security requirements analysis: An attacker's perspective 整体安全需求分析:攻击者的视角
Pub Date : 2015-08-01 DOI: 10.1109/RE.2015.7320439
Tong Li, E. Paja, J. Mylopoulos, Jennifer Horkoff, Kristian Beckers
The ever-growing complexity of systems makes their protection more challenging, as a single vulnerability or exposure of any component of the system can lead to serious security breaches. This problem is exacerbated by the fact that the system development community has not kept up with advances in attack knowledge. In this demo paper, we propose a holistic attack analysis approach to identify and tackle both atomic and multistage attacks, taking into account not only software attacks but also attacks that are targeted at people and hardware. To bridge the knowledge gap between attackers and defenders, we systematically analyze and refine the malicious desires of attackers (i.e., anti-goals), and leverage a comprehensive attack pattern repository (CAPEC) to operationalize attacker goals into concrete attack actions. Based on the results of our attack analysis, appropriate security controls can be selected to effectively tackle potential attacks.
系统不断增长的复杂性使其保护更具挑战性,因为系统的任何组件的单个漏洞或暴露都可能导致严重的安全漏洞。由于系统开发团体没有跟上攻击知识的发展,这个问题更加严重了。在这篇演示论文中,我们提出了一种全面的攻击分析方法来识别和处理原子攻击和多阶段攻击,不仅考虑到软件攻击,还考虑到针对人和硬件的攻击。为了弥合攻击者和防御者之间的知识鸿沟,我们系统地分析和细化攻击者的恶意愿望(即反目标),并利用综合攻击模式存储库(CAPEC)将攻击者的目标操作化为具体的攻击行动。根据攻击分析的结果,可以选择适当的安全控制来有效地处理潜在的攻击。
{"title":"Holistic security requirements analysis: An attacker's perspective","authors":"Tong Li, E. Paja, J. Mylopoulos, Jennifer Horkoff, Kristian Beckers","doi":"10.1109/RE.2015.7320439","DOIUrl":"https://doi.org/10.1109/RE.2015.7320439","url":null,"abstract":"The ever-growing complexity of systems makes their protection more challenging, as a single vulnerability or exposure of any component of the system can lead to serious security breaches. This problem is exacerbated by the fact that the system development community has not kept up with advances in attack knowledge. In this demo paper, we propose a holistic attack analysis approach to identify and tackle both atomic and multistage attacks, taking into account not only software attacks but also attacks that are targeted at people and hardware. To bridge the knowledge gap between attackers and defenders, we systematically analyze and refine the malicious desires of attackers (i.e., anti-goals), and leverage a comprehensive attack pattern repository (CAPEC) to operationalize attacker goals into concrete attack actions. Based on the results of our attack analysis, appropriate security controls can be selected to effectively tackle potential attacks.","PeriodicalId":132568,"journal":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128957949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Technology transfer - Requirements Engineering research to industrial practice an open (ended) debate 技术转移-需求工程研究到工业实践的开放(结束)辩论
Pub Date : 2015-08-01 DOI: 10.1109/RE.2015.7320462
C. H. C. Duarte, T. Gorschek
Technology and knowledge have been recognized as main sources of competitive advantage of corporations, industries and nations, particularly in the software domain. They have led to the creation of local ecosystems devoted to development and transfer activities, which ensure not only personal and institutional motivation/recognition, but also social and economic gains. An open (ended) debate panel is proposed in order to develop greater awareness and seek deeper understanding of such activities from Requirements Engineering research to industrial practice. The panel involves researchers and practitioners with the perspective of eliciting: (i) experiences in knowledge and technology development and transfer; (ii) awareness and effectiveness of models and patterns; and (iii) factors for having successful collaboration between research institutions and industry. The organizers also plan to run a survey during and after the conference, summarizing their conclusions in specific post-conference reports.
技术和知识已经被认为是公司、行业和国家竞争优势的主要来源,尤其是在软件领域。它们导致建立了专门用于发展和转让活动的地方生态系统,这不仅确保了个人和机构的动机/认可,而且确保了社会和经济收益。为了从需求工程研究到工业实践的这些活动,提出了一个开放的(结束的)辩论小组,以提高认识并寻求更深入的理解。小组成员包括研究人员和从业人员,他们的观点是:(i)知识和技术发展和转让方面的经验;对模型和模式的认识和有效性;(三)科研机构与产业界成功合作的因素。组织者还计划在会议期间和会议结束后进行调查,在具体的会后报告中总结他们的结论。
{"title":"Technology transfer - Requirements Engineering research to industrial practice an open (ended) debate","authors":"C. H. C. Duarte, T. Gorschek","doi":"10.1109/RE.2015.7320462","DOIUrl":"https://doi.org/10.1109/RE.2015.7320462","url":null,"abstract":"Technology and knowledge have been recognized as main sources of competitive advantage of corporations, industries and nations, particularly in the software domain. They have led to the creation of local ecosystems devoted to development and transfer activities, which ensure not only personal and institutional motivation/recognition, but also social and economic gains. An open (ended) debate panel is proposed in order to develop greater awareness and seek deeper understanding of such activities from Requirements Engineering research to industrial practice. The panel involves researchers and practitioners with the perspective of eliciting: (i) experiences in knowledge and technology development and transfer; (ii) awareness and effectiveness of models and patterns; and (iii) factors for having successful collaboration between research institutions and industry. The organizers also plan to run a survey during and after the conference, summarizing their conclusions in specific post-conference reports.","PeriodicalId":132568,"journal":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121170725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The myth of bad passive voice and weak words an empirical investigation in the automotive industry 汽车行业不良被动语态和弱词神话的实证调查
Pub Date : 2015-08-01 DOI: 10.1109/RE.2015.7320451
J. Krisch, F. Houdek
In requirements engineering literature dealing with natural language specifications, we usually find writing rules like `avoid passive voice' or `do not use weak words'. Adhering to such rules should result in understandable and unambiguous requirements. Passive voice, especially when used without an explicit actor, is considered to result in incomplete requirements. The usage of weak words is considered to result in imprecise requirements that are hardly testable. But is the inversion of the claim correct, i.e. does the violation of the writing rules result in problematic specifications? At least in our environment (the passenger car development of Mercedes-Benz) we observe that authors often use passive voice, and there are many requirements containing weak words. To answer this question, we conducted an empirical investigation whose results we report in this paper. The results of this investigation are quite surprising: The use of passive voice, even when the actor is missing, is almost never problematic, as the missing information (the actor) can in most cases easily derived from the context (i.e. surrounding requirements or the general project context). The usage of weak words may be considered problematic in approximately 12% of all occurrences. For an automatic analysis on weak words linguistic patterns can be defined to detect these problematic occurences.
在处理自然语言规范的需求工程文献中,我们通常会发现诸如“避免被动语态”或“不使用弱词”之类的写作规则。遵守这些规则应该会产生可理解和明确的需求。被动语态,特别是在没有明确的行为人的情况下使用时,被认为会导致不完整的需求。弱词的使用被认为会导致难以测试的不精确需求。但是权利要求的倒置是否正确,即违反书写规则是否会导致说明书出现问题?至少在我们的环境中(梅赛德斯-奔驰的乘用车开发),我们观察到作者经常使用被动语态,并且有许多包含弱词的要求。为了回答这个问题,我们进行了一项实证调查,我们将其结果报告在本文中。这项调查的结果是相当令人惊讶的:被动语态的使用,即使没有行动者,也几乎没有问题,因为在大多数情况下,缺失的信息(行动者)可以很容易地从上下文(即周围需求或一般项目上下文)中获得。弱词的使用在大约12%的出现中可能被认为是有问题的。对于弱词的自动分析,可以定义语言模式来检测这些问题的出现。
{"title":"The myth of bad passive voice and weak words an empirical investigation in the automotive industry","authors":"J. Krisch, F. Houdek","doi":"10.1109/RE.2015.7320451","DOIUrl":"https://doi.org/10.1109/RE.2015.7320451","url":null,"abstract":"In requirements engineering literature dealing with natural language specifications, we usually find writing rules like `avoid passive voice' or `do not use weak words'. Adhering to such rules should result in understandable and unambiguous requirements. Passive voice, especially when used without an explicit actor, is considered to result in incomplete requirements. The usage of weak words is considered to result in imprecise requirements that are hardly testable. But is the inversion of the claim correct, i.e. does the violation of the writing rules result in problematic specifications? At least in our environment (the passenger car development of Mercedes-Benz) we observe that authors often use passive voice, and there are many requirements containing weak words. To answer this question, we conducted an empirical investigation whose results we report in this paper. The results of this investigation are quite surprising: The use of passive voice, even when the actor is missing, is almost never problematic, as the missing information (the actor) can in most cases easily derived from the context (i.e. surrounding requirements or the general project context). The usage of weak words may be considered problematic in approximately 12% of all occurrences. For an automatic analysis on weak words linguistic patterns can be defined to detect these problematic occurences.","PeriodicalId":132568,"journal":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","volume":"13 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132925189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2015 IEEE 23rd International Requirements Engineering Conference (RE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1