期刊文献+

基于Tropos模型的需求风险分析 被引量:2

Risk Analysis of Requirements Basing-on Tropos Model
下载PDF
导出
摘要 Tropos模型没有考虑需求风险分析.为了分析需求风险,本文介绍了一种基于Tropos模型的需求风险分析方法.该方法提出了基于Tropos目标图的需求关系框架,并以此为基础识别和分析需求的风险因素:干系人,环境,技术,和需求复杂度,最终获得需求的可行性风险.由于其主观性,这些风险因素通过相关专家打分来获得风险值.本文通过列车系统部分功能的实际应用说明该方法的使用过程,以及其能够在需求过程中及时发现存在风险的干系人和需求.这样就能较早地解决风险,节省项目成本. Risk of requirement is ignored in Tropos model. To analysis risks and relationships of requirements, a method ana- lyzing risks in requirement phase is introduced. It' s on the base of Tropos model, and proposes a Tropos goal gram-based framework of requirement relationship to identify risk factors of requirements: stakeholder, environment, technology and complexity of require- ment and assess risk about feasibility of requirements. Because of subjectivity, these risk factors are assessed by relative experts. It is proved by an example of train sub-system that the method can identify stakeholders and requirement with risk in time. This makes it earlier to solve risks and saves cost of project.
作者 李晓红 刘强
出处 《电子学报》 EI CAS CSCD 北大核心 2010年第B02期1-5,共5页 Acta Electronica Sinica
基金 核高基项目:国产基础软件重大应用示范领域驱动的基础软件应用模式研究(No.2009ZX01045-001-001-02) 国家863高技术研究发展计划(No.2007AA01Z122)
关键词 需求 Tropos模型 目标 干系人 风险 requirement Tropos model goal stakeholder risk
  • 相关文献

参考文献9

  • 1Tom DeMarco, Tim Lister. Risk management during requirements[J].IEEE Software,2003,20(5) :99 - 101.
  • 2Feather M S,Comford S L,Hicks K A, Kiper J D,Menzies T. A broad quantitative model for making early requirements decisions[J]. IEEE Software,2008,25(2) :49 - 56.
  • 3向坚,刘璘,YU Eric.一种基于社交关系模型的系统安全分析方法[J].电子学报,2006,34(B12):2350-2354. 被引量:1
  • 4Boness K, Finkelstein A, Harrison R. A lightweight technique for assessing risks in requirements analysis[ J ]. IET Software, 2008,2(1) :46 - 57.
  • 5Breciani P, Giorgini P, Giunchiglia F etal. Tropos: an agent-oriented software development methodology[J]. Autonomous Agents and Multi-Agent Systerns,2004,8(3 ):203- 236.
  • 6Ward S. Requirements for an effective project risk mana-gement process[ J ]. Project Management, 1999,30(3) :37 - 43.
  • 7Woolridge R W, McManus D J, Hale J E. Stakeholder risk assessment: an outcome-based approach [ J ]. IEEE Software, 2007,24(2) :36 - 45.
  • 8Wallace L, Keil M. Software project risks and their effect on outcomes[ J]. Communications of the ACM,2004,47(4) :68 - 73.
  • 9吴越,王智学,陈彬.需求模型中目标的关系及其发现方法[J].计算机工程,2008,34(14):35-37. 被引量:3

二级参考文献14

  • 1Schneier, B. Beyond Fear, Thinking Sensibly About Security in an Uncertain World[ M]. Copernicus Books, 2003.
  • 2Liu L, Yu E, Mylopoulos J. Security and privacy requirements analysis within a social setting[A] .The 11^th IEEE Int Requirements Engineering Conference ( RE' 03 ) [ C ]. Monterey Bay,California USA, 2003.8 - 12.
  • 3Sandu R. Good-enough security: towards a pragmatic businessdriven discipline[ J] . IEEE Internet Computing. Security Track,2003 .7(1) :66 - 68.
  • 4Chung L, Nixon B A, Yu E, Mylopoulos J. Non-Functional Requirements in Software Engineering [ M ]. Kluwer Academic Publishers, 2000.
  • 5R Falcone, M Singh, Y H Tan, et al. Trust in Cyber-Soeiefies-Integrating the Human and Artificial Perspectives [ M]. Berlin:Springer,2001.175 - 194.
  • 6Yu E. Agent-oriented modelling: software versus the world[A].Agent-Oriented Software Engineering AOSE-2001 Workshop Proceedings[C]. LNCS 2222. Springer Verlag, 2001. 206-225.
  • 7Liu L, Yu E, Mylopoulos J. Security design based on social modeling [ A ]. Proceedings of Thirteenth Annual International Computer Software & Application Conference (COMPSAC)[ C]. Chicago, 2006.71 - 76.
  • 8Schneier B. Attack trees: modeling security threats [ J]. Dr Dobb's Journal, 1999,12(24) :21 - 29.
  • 9Yu E. Towards modeling and reasoning support for early-phase requirement engineering[ A]. Proceedings of the 3^rd IEEE International Symposium on Requirements Engineering(RE97) [ C ].Washington, 1997.226 - 235.
  • 10Lamsweerde D, Fickas A. Goal-directed Requirements Acquisition[J]. Science of Computer Programming, 1993, 20(7): 249-262.

共引文献2

同被引文献21

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部