23.02.2015 Views

D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange

D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange

D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Fig. 4. SI* conceptual model<br />

quirements, he can run the requirement analysis to determine the level of achievement<br />

also for top-level requirements.<br />

Identify the problem. If some of the requirements are not fulfilled, the requirement<br />

engineer must identify the problem.<br />

1. If there is a problem with the ReM, the requirement engineer must backtrack<br />

and search for an alternative way of updating the ReM when considering the<br />

change request that was initially passed from the user.<br />

b If there is a problem with testing, the test engineer must determine whether<br />

there is the need to generate new test cases or not.<br />

4 Change management for evolving requirements<br />

For the change management process in the requirement domain we consider here the<br />

SI* requirement model [11] based on the Tropos methodology. As illustrated in Fig. 4,<br />

we consider the concept of goal and a subset of SI* relations, namely AND/OR decomposition,<br />

means-end, require, request, and dependency relations.<br />

The requirement analysis process consists of five steps:<br />

1. Identify relevant stakeholders, modeled as actor (circle) and its structure.<br />

2. Capture and refine actors’requirements as goal (rounded rectangle).<br />

3. Define means to achieve their goals- i.e., process (hexagon) or resource (rectangle).<br />

4. Model strategic dependencies between actors in fulfilling/executing/providing some<br />

goals/processes/resources.<br />

5. Model specific security and risk related aspects such as introducing security goals,<br />

which are goals protecting assets and that can be identified as result of risk analysis<br />

[24] or analyzing trust relations and delegation of permissions among actors<br />

[11].<br />

6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!