Stakeholder Goal

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 12777 Experts worldwide ranked by ideXlab platform

John Mylopoulos - One of the best experts on this subject based on the ideXlab platform.

  • RE - Goal-Oriented Conceptual Database Design
    15th IEEE International Requirements Engineering Conference (RE 2007), 2007
    Co-Authors: Lei Jiang, Alexander Borgida, Thodoros Topaloglou, John Mylopoulos
    Abstract:

    We present details of a Goal-oriented process for database requirements analysis. This process consists of a number of steps, spanning the spectrum from high-level Stakeholder Goal analysis to detailed conceptual schema design. The paper shows how Goal modeling contributes to systematic scoping and analysis of the application domain, and subsequent formal specification of database requirements based on this domain analysis. Moreover, a Goal-oriented design strategy is proposed to structure the transformation from the domain model to the conceptual schema, according to a set of user defined design issues, also modeled as Goals. The proposed process is illustrated step-by-step using a running example from the design of a real-world, industrial biological database. We also report early progress towards building full tool support, by presenting a prototype that captures and stores design sessions in a queryable form. This facility makes it possible to answer questions that are hard, if not impossible, to answer using existing methodologies for database design.

  • RE - Reverse engineering Goal models from legacy code
    13th IEEE International Conference on Requirements Engineering (RE'05), 2005
    Co-Authors: Yiqiao Wang, John Mylopoulos, Sotirios Liaskos, Alexei Lapouchnian, J.c.s. Do Prado Leite
    Abstract:

    A reverse engineering process aims at reconstructing high-level abstractions from source code. This paper presents a novel reverse engineering methodology for recovering Stakeholder Goal models from both structured and unstructured legacy code. The methodology consists of the following major steps: 1) Refactoring source code by extracting methods based on comments; 2) Converting the refactored code into an abstract structured program through statechart refactoring and hammock graph construction; 3) Extracting a Goal model from the structured program's abstract syntax tree; 4) Identifying nonfunctional requirements and derive soft Goals based on the traceability between the code and the Goal model. To illustrate this requirements recovery process, we refactor Stakeholder Goal models from two legacy software code bases: an unstructured Web-based email in PHP (SquirrelMail) and a structured email client system in Java (Columba).

Nobukazu Yoshioka - One of the best experts on this subject based on the ideXlab platform.

  • QoP - Enforcing a security pattern in Stakeholder Goal models
    Proceedings of the 4th ACM workshop on Quality of protection - QoP '08, 2008
    Co-Authors: Haruhiko Kaiya, Hironori Washizaki, Yingfei Xiong, Nobukazu Yoshioka
    Abstract:

    Patterns are useful knowledge about recurring problems and solutions. Detecting a security problem using patterns in requirements models may lead to its early solution. In order to facilitate early detection and resolution of security problems, in this paper, we formally describe a role-based access control (RBAC) as a pattern that may occur in Stakeholder requirements models. We also implemented in our Goal-oriented modeling tool the formally described pattern using model-driven queries and transformations. Applied to a number of requirements models published in literature, the tool automates the detection and resolution of the security pattern in several Goal-oriented Stakeholder requirements.

Sonia Giovinazzi - One of the best experts on this subject based on the ideXlab platform.

  • Balancing Stakeholder views for decision-making in steel structural fire design
    Proceedings of the Second International Conference on Performance-based and Life-cycle Structural Engineering (PLSE 2015), 2015
    Co-Authors: Obinna Ukeni Akaa, Anthony K. Abu, Michael Spearpoint, Sonia Giovinazzi
    Abstract:

    Fire design Stakeholders such as architects, regulators, fire service, etc., often have different opinions about which passive fire protection approach is the most appropriate one in meeting structural fire performance objectives. There are many options for protecting steel buildings in a fully developed fire, but there is the need to identify a strategy that could satisfy at best the different and sometimes conflictual Stakeholder desires, thereby reducing design uncertainties. This paper proposes a three-stage approach to address this issue: (i) Stakeholder engagement, to identify and extract Stakeholder desires; (ii) decision analysis, and; (iii) risk-based parametric study. The paper focuses, in particular on the first two stages. The first stage describes the process of identification and extraction of Stakeholder desires in steel structural fire design from literature and structured interviews through a Stakeholder engagement plan. The second stage of the decision-making process is demonstrated using a simple Stakeholder Goal-rating and multi-criteria decision analysis (MCDA). In particular, the use of analytic hierarchy process (AHP) is proposed to manage the multiplicity of Stakeholder desires towards common decision-criteria, manage possible inconsistent Goal-rating, and to rank the different proposed passive fire protection options.

Peter H. Feiler - One of the best experts on this subject based on the ideXlab platform.

  • ISoLA (1) - Integrated Modeling Workflow for Security Assurance
    Leveraging Applications of Formal Methods Verification and Validation: Foundational Techniques, 2016
    Co-Authors: Min-young Nam, Julien Delange, Peter H. Feiler
    Abstract:

    Cyber-physical systems are generally composed of several software components executing on different processors that are interconnected through entities that can be represented as buses. These complex systems collocate functions operating at different security levels, which can introduce unexpected interactions that affect system security. The security policy for these systems is realized through various complex physical or logical mechanisms. The security policy, as a Stakeholder Goal, is then refined into system requirements and implementation constraints that are used to guarantee security objectives. Unfortunately, verifying the correct decomposition and its enforcement in the system architecture is an overwhelming task. To overcome these issues, requirements must be clearly specified and traced through the system architecture, and automatically verified throughout the development process.

Haruhiko Kaiya - One of the best experts on this subject based on the ideXlab platform.

  • QoP - Enforcing a security pattern in Stakeholder Goal models
    Proceedings of the 4th ACM workshop on Quality of protection - QoP '08, 2008
    Co-Authors: Haruhiko Kaiya, Hironori Washizaki, Yingfei Xiong, Nobukazu Yoshioka
    Abstract:

    Patterns are useful knowledge about recurring problems and solutions. Detecting a security problem using patterns in requirements models may lead to its early solution. In order to facilitate early detection and resolution of security problems, in this paper, we formally describe a role-based access control (RBAC) as a pattern that may occur in Stakeholder requirements models. We also implemented in our Goal-oriented modeling tool the formally described pattern using model-driven queries and transformations. Applied to a number of requirements models published in literature, the tool automates the detection and resolution of the security pattern in several Goal-oriented Stakeholder requirements.