Supakkul, Sam; Hill, Tom; Chung, Lawrence; Tun, Thein Than and do Prado Leite, Julio Cesar Sampaio
This is the latest version of this eprint.
Due to copyright restrictions, this file is not available for public download
Click here to request a copy from the OU Author.
|DOI (Digital Object Identifier) Link:||https://doi.org/10.1109/RE.2010.31|
|Google Scholar:||Look up in Google Scholar|
Non-functional requirements (NFRs), such as security and cost, are generally subjective and oftentimes synergistic or conflicting with each other. Properly dealing with such NFRs requires a large body of knowledge – goals to be achieved, problems or obstacles to be avoided, alternative solutions to mitigate the problems, and the best compromising alternative solution to be selected. However, few patterns exist for dealing with these kinds of knowledge of NFRs. In this paper, we present four kinds of NFR patterns for capturing and reusing knowledge of NFRs – objective pattern, problem pattern, alternatives pattern and selection pattern. NFR patterns may be visually represented, and organized by rules of specialization to create more specific patterns, of composition to build larger patterns, and of instantiation to create new patterns using existing patterns as templates. We have applied the NFR pattern approach to the TJX incident, one of the largest credit card theft in history, as a realistic case study.
|Item Type:||Conference Item|
|Copyright Holders:||2010 IEEE|
|Extra Information:||This paper appears in the Proceedings of the 2010 18th IEEE International Requirements Engineering Conference (RE), pp. 179-188, (ISBN. 978-1-4244-8022-7)|
|Academic Unit/Department:||Faculty of Science, Technology, Engineering and Mathematics (STEM) > Computing and Communications
Faculty of Science, Technology, Engineering and Mathematics (STEM)
|Interdisciplinary Research Centre:||Centre for Research in Computing (CRC)
Centre for Policing Research and Learning (CPRL)
|Depositing User:||Thein Tun|
|Date Deposited:||03 Jun 2011 08:56|
|Last Modified:||08 Oct 2016 07:17|
|Share this page:|
Available Versions of this Item
An NFR pattern approach to dealing with NFRs. (deposited 25 Jan 2011 09:22)
- An NFR pattern approach to dealing with NFRs. (deposited 03 Jun 2011 08:56) [Currently Displayed]