Skip to main content
Log in

Die SIKOSA-Methodik

Unterstützung der industriellen Software-produktion durch methodisch integrierte Softwareentwicklungsprozesse

The SIKOSA-method — Support of the industrial software production by methodically integrated software engineering processes

  • Published:
WIRTSCHAFTSINFORMATIK

Kernpunkte

  • Die SIKOSA-Methodik beschreibt einen durchgängigen Lösungsansatz zur Softwareentwicklung.

  • Die Methodik überführt funktionale und nicht funktionale Prozessanforderungen in entsprechende testbare Unternehmenssoftware-Anforderungen und erhöht die Validität.

  • Die Methodik wird vor dem Hintergrund eines industriellen Beschaffungsprozesses veranschaulicht.

Abstract

The SIKOSA method addresses the consistency of quality assuring methods in software engineering processes. To support an industrial business software production a new consistent and quality-oriented method was developed. Regarding business processes, which have to be supported, functional and non-functional requirements of business software are specified and transferred into automated test cases and test data.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Literatur

  1. Alexander, I.: Misuse Cases Help to Elicit Non-Functional Requirements. In: Computing & Control Engineering Journal 14 (2003) 1, S. 40–45.

    Article  Google Scholar 

  2. Bieser, T.; Fürstenau, H.; Otto, S.; Weiß, D.: Requirements Engineering. In: Kirn, S.; Herzog, O.; Lockemann, P.; Spaniol, O. (Hrsg.): Multiagent Engineering. Theory and Applications in Enterprises. Heidelberg 2006, S. 359–381.

  3. Binnig, C.; Kossmann, D.; Lo, R.: Testing database applications. In: Proceedings of the 25th ACM SIGMOD International Conference on Management of Data / Principles of Database Systems. Chicago 2006, S. 739–741.

  4. Binnig, C.; Kossmann, D.; Lo, R.: Reverse Query Processing. In: Proceedings of the 23rd IEEE International Conference on Data Engineering (ICDE 2007). Istanbul 2007, im Erscheinen.

  5. Bosch, J.; Molin, P.: Software Architecture Design: Evaluation and Transformation. In: Proceedings of the IEEE Conference and Workshop on Engineering of Computer-Based Systems. Potsdam 1999, S. 4–10.

  6. Bruno, N.; Chaudhuri, S.: Flexible database generators. In: Proceedings of the 31st International Conference on Very Large Data Bases (VLDB). Trondheim 2005, S. 1097–1107.

  7. Brücher, H.; Endl, R.: Erweiterung von UML zur geschäftsregelorientierten Prozess-modellierung. Heidelberg 2002.

  8. Chays, D.; Deng, Y.; Frankl, P. G.; Dan, S.; Vokolos, F. I.; Weyuker E. J.: An AGENDA for testing relational database applications. In: Software Testing, verification and reliability 14 (2004) 1, S. 17–44.

    Article  Google Scholar 

  9. Cockburn, A.: Writing effective use cases. Boston 2001.

  10. Gamma, E.; Helm, R.; Johnson, R.; Vlissides, J.: Design Patterns, Elements of Reusable Object-Oriented Software. Reading 1995.

  11. Greenfield, J.; Short, K.: Software Factories. Assembling Applications with Patterns, Models, Frameworks and Tools. In: Proceedings of the 18th Annual ACM Conference on Object-Oriented Programming, Systems, Languages and Applications (OOPSLA 2003). Anaheim 2003, S. 16–27.

  12. Graham, D.; Fewster, M.: Software Test Automation. Effective Use of Test Execution Tools. Harlow 1999.

  13. Haftmann, F.; Kossmann, D.; Lo, E.: A Framework for Efficient Regression Tests of Database Application Systems. In: The VLDB Journal 16 (2007) 1, S. 145–164.

    Article  Google Scholar 

  14. Herrmann, A.; Paech, B.: MOQARE = Misuse-oriented Quality Requirements Engineering — Über den Nutzen von Bedrohungsszenarien beim RE von Qualitätsanforderungen. In: Softwaretechnik-Trends 26 (2006) 1, S. 13–14.

    Google Scholar 

  15. Herrmann, A.; Rückert, J.; Paech, B.: Exploring the Interoperability of Web Services using MOQARE. In: Proceedings of the 1st International Workshop on Interoperability Solutions to Trust, Security, Policies and QoS for Enhanced Enterprise Systems. Bordeaux 2006, S. 199–211.

  16. Hevner, A. R.; March, S. M.; Park, J.; Ram, S.: Design Science in Information Systems Research. In: MIS Quarterly 28 (2004) 1, S. 75–105.

    Google Scholar 

  17. Illes, T.; Paech, B.: From V to U or: How Can We Bridge the V-Gap Between Requirements and Test? In: Software & Systems Quality Conferences. Düsseldorf 2006.

  18. Illes, T.; Paech, B.: An Analysis of Use Case Based Testing Approaches Based on a Defect Taxonomy. In: IFIP International Federation for Information Processing: Software Engineering Techniques: Design for Quality (SET2006), Boston 2006, S. 211–222.

  19. International Organization for Standardization (ISO): ISO/IEC 9126: Information technology — Software product evaluation — Quality characteristics and guidelines for their use. Genf 1991.

  20. Jarke, M.: Scenarios for Modelling. In: Communications of the ACM 42 (1999) 1, S. 47–48.

    Article  Google Scholar 

  21. Korherr, B.; List, B.: Aligning Business Processes and Software Connecting the UML 2 Profile for Event Driven Process Chains with Use Cases and Components. In: Proceedings of the 18th International Conference on Advanced Information Systems Engineering (CAiSE’06). Luxembourg 2006, S. 19–22.

  22. Korherr, B.; List, B.: A UML 2 Profile for Event Driven Process Chains. A UML 2 Profile for Business Process Modelling. http://wit.tuwien.ac.at/people/list/publications/confenis2006.pdf, Abruf am 2007-03-07.

  23. Kirn, S.; Paech, B.; Müller, G.; Kossmann, D.: Die SIKOSA-Methodik. Arbeitsbericht. Hohenheim, Heidelberg, Freiburg, Zürich 2006.

  24. Lassing, N.; Rijsenbrij, D.; van Vliet, H.: Towards a Broader View on Software Architecture Analysis of Flexibility. In: Proceedings of the 6th Asia-Pacific Software Engineering Conference (APSEC ′99). Takamatsu 1999, S. 238–245.

  25. Noran, O.S.: Business Modelling: UML vs. IDEF. http://www.cit.gu.edu.au/:_noran/Docs/UMLvsIDEF.pdf, Abruf am 2006-10-12.

  26. Organization for the Advancement of Structured Information Standards (OASIS): eXtensible Access Control Markup Language (XACML) Version 1.0. http://www.oasis-open.org/committees/download.php/2406/oasis-xacml-1.0.pdf, Abruf am 2007-02-20.

  27. Paech, B.; Kohler, K.: Task-driven Requirements in object-oriented Development. In: Leite, J.; Doorn, J. (Hrsg.): Perspectives on Requirements Engineering. Norwell 2003, S. 45–67.

  28. Sackmann, S., Strüker, J.; Accorsi, R.: Personalization in privacy-aware highly dynamic systems. Communications of the ACM 49 (2006) 9, S. 32–38.

    Article  Google Scholar 

  29. Scheer, A.; Habermann, F.: Making ERP a success. In: Communications of the ACM 43 (2000) 3, S. 57–61.

    Article  Google Scholar 

  30. Scheer, A.-W.: Wirtschaftsinformatik. Referenzmodelle für industrielle Geschäftsprozesse. 7. Aufl., Berlin 1997.

  31. Scheer, A.-W.: ARIS — Modellierungs-methoden, Metamodelle, Anwendungen. 4. Aufl., Berlin 2001.

  32. Sindre, G.; Opdahl, A. L.: Templates for Misuse Case Description. In: Proceedings of the 7th International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ 2001). Interlaken 2001, S. 125–136.

  33. Spillner, A.: From V-Model to W-Model — Establishing the Whole Test Process. In: Proceedings of the 4th Conference on Quality Engineering in Software Technology (Conquest 2000). Nürnberg 2000, S. 222–231.

  34. Strahringer, S.: Metamodellierung als Instrument des Methodenvergleichs. Eine Evaluierung am Beispiel objektorientierter Analysemethoden. Aachen 1996.

  35. Sysiphus. http://sysiphus.informatik.tu-muenchen.de, Abruf am 2006-12-08.

  36. Working Group on Requirements Engineering Patterns (WGREP): Final Report, Requirements Engineering Patterns — An Approach to Capturing and Exchanging Requirements Engineering Experience. http://repare.desy.de/Repare/pdf/Report%20WG%20RE%20Pattern.pdf, Abruf am 2007-02-22.

  37. Wohlgemuth, S.; Müller, G.: Privacy with Delegation of Rights by Identity Management. In: Proceedings of the International Conference on Emerging Trends in Information and Communication Security (ETRICS 2006), Freiburg 2006, S. 175–199.

  38. Weidenhaupt, K.; Pohl, K.; Jarke, M.; Haumer, P.: Scenario Usage in System Development: A Report on Current Practice. In: IEEE Software 15 (1998) 2, S. 34–45.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Weiß, D., Kaack, J., Kirn, S. et al. Die SIKOSA-Methodik. Wirtsch. Inform. 49, 188–198 (2007). https://doi.org/10.1007/s11576-007-0049-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11576-007-0049-y

Stichworte

Keywords

Navigation