Copy the page URI to the clipboard
Supakkul, Sam; Hill, Tom; Chung, Lawrence; Tun, Thein Than and do Prado Leite, Julio Cesar Sampaio
(2010).
DOI: https://doi.org/10.1109/RE.2010.31
Abstract
Non-functional requirements (NFRs), such as security and cost, are generally subjective and oftentimes synergistic or conflicting with each other. Properly dealing with such NFRs requires a large body of knowledge – goals to be achieved, problems or obstacles to be avoided, alternative solutions to mitigate the problems, and the best compromising alternative solution to be selected. However, few patterns exist for dealing with these kinds of knowledge of NFRs. In this paper, we present four kinds of NFR patterns for capturing and reusing knowledge of NFRs – objective pattern, problem pattern, alternatives pattern and selection pattern. NFR patterns may be visually represented, and organized by rules of specialization to create more specific patterns, of composition to build larger patterns, and of instantiation to create new patterns using existing patterns as templates. We have applied the NFR pattern approach to the TJX incident, one of the largest credit card theft in history, as a realistic case study.
Viewing alternatives
Metrics
Public Attention
Altmetrics from AltmetricNumber of Citations
Citations from Dimensions- Request a copy from the author This file is not available for public download
Item Actions
Export
About
- Item ORO ID
- 28882
- Item Type
- Conference or Workshop Item
- ISSN
- 1090-705X
- Extra Information
- This paper appears in the Proceedings of the 2010 18th IEEE International Requirements Engineering Conference (RE), pp. 179-188, (ISBN. 978-1-4244-8022-7)
- Academic Unit or School
-
Faculty of Science, Technology, Engineering and Mathematics (STEM) > Computing and Communications
Faculty of Science, Technology, Engineering and Mathematics (STEM) - Research Group
- Centre for Research in Computing (CRC)
- Copyright Holders
- © 2010 IEEE
- Related URLs
-
- http://mcs.open.ac.uk/ttt23/(Author Website)
- Depositing User
- Thein Tun