Skip to main content
Log in

Requirements model generation to support requirements elicitation: the Secure Tropos experience

  • Published:
Automated Software Engineering Aims and scope Submit manuscript

Abstract

In recent years several efforts have been devoted by researchers in the Requirements Engineering community to the development of methodologies for supporting designers during requirements elicitation, modeling, and analysis. However, these methodologies often lack tool support to facilitate their application in practice and encourage companies to adopt them.

In this paper, we present our experience in the application of methods for the transformation of requirements specifications expressed in natural language into semi-structured specifications. More specifically, we apply a lightweight method for extracting requirements from system descriptions in natural language to support the Secure Tropos methodology during requirements elicitation phase. Our proposal is based on Cerno, a semantic annotation environment, which uses high-speed context-free robust parsing combined with simple word search. To evaluate our proposal, we discuss its application to the requirements elicitation process followed in the course of a European project on four industrial case studies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Ambriola, V., Gervasi, V.: On the systematic analysis of natural language requirements with Circe. Autom. Softw. Eng. 13(1), 107–167 (2006)

    Article  Google Scholar 

  • Asnar, Y., Bonato, R., Bryl, V., Compagna, L., Dolinar, K., Giorgini, P., Holtmanns, S., Klobucar, T., Lanzi, P., Latanicki, J., Massacci, F., Meduri, V., Porekar, J., Riccucci, C., Saidane, A., Seguran, M., Yautsiukhin, A., Zannone, N.: Security and privacy requirements at organizational level. Research report A1.D2.1, SERENITY consortium (2006)

  • Baniassad, E., Clarke, S.: Theme: An Approach for Aspect-Oriented Analysis and Design. In: Proc. of the Int. Conf. on Software Engineering (2004)

  • Breaux, T.D., Vail, M.W., Antón, A.I.: Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations. In: Proc. of RE’06, pp. 46–55. IEEE, New York (2006)

    Google Scholar 

  • Bresciani, P., Giorgini, P., Giunchiglia, F., Mylopoulos, J., Perini, A.: TROPOS: An Agent-Oriented Software Development Methodology. JAAMAS 8(3), 203–236 (2004)

    Google Scholar 

  • Burg, J.F.M.: Linguistic Instruments in Requirements Engineering. IOS Press (1996)

  • Campadello, S., Compagna, L., Gidoin, D., Giorgini, P., Holtmanns, S., Latanicki, J., Meduri, V., Pazzaglia, J.-C., Seguran, M., Thomas, R., Zannone, N.: S&D Requirements Specification. Research report A7.D2.1, SERENITY consortium (2006a)

  • Campadello, S., Compagna, L., Gidoin, D., Holtmanns, S., Meduri, V., Pazzaglia, J.-C., Seguran, M., Thomas, R.: Scenario selection and definition. Research report A7.D1.1, SERENITY consortium (2006b)

  • Chantree, F., Nuseibeh, B., de Roeck, A., Willis, A.: Identifying nocuous ambiguities in natural language requirements. In: Proc. of RE’06, pp. 59–68. IEEE, New York (2006)

    Google Scholar 

  • Cole, S.V., Royal, M.D., Valtorta, M.G., Huhns, M.N., Bowles, J.B.: A lightweight tool for automatically extracting causal relationships from text. In: Proc. of IEEE Southeastcon 2006, pp. 125–129 (2006)

  • Cordes, D.W., Carver, D.L.: An Object-Based Requirements Modeling Method. Journal of the American Society for Information Science 43(1), 62–71 (1992)

    Article  Google Scholar 

  • Cordy, J.R.: The TXL source transformation language. Sci. Comput. Program. 61(3), 190–210 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  • Fuchs, N.E., Schwertel, U., Schwitter, R.: Attempto Controlled English–not just another logic specification language. In: Proc. of LOPSTR’98. LNCS, vol. 1559, pp. 1–20. Springer, Berlin (1998)

    Google Scholar 

  • Giorgini, P., Massacci, F., Zannone, N.: Security and Trust Requirements Engineering. In: FOSAD 2004/2005. LNCS, vol. 3655, pp. 237–272. Springer, Berlin (2005)

    Google Scholar 

  • Goldin, L., Berry, D.: AbstFinder, A prototype natural language text abstraction finder for use in requirements elicitation. Autom. Softw. Eng. 4(4), 375–412 (1997)

    Article  Google Scholar 

  • Handschuh, S., Staab, S., Ciravegna, F.: S-CREAM—Semi-automatic CREAtion of Metadata. In: Proc. of EKAW’02. LNCS, vol. 2473, pp. 358–372. Springer, Berlin (2002)

    Google Scholar 

  • Hirst, G.: Anaphora in Natural Language Understanding: A Survey. LNCS, vol. 119. Springer, Berlin (1981)

    Google Scholar 

  • IBM: IBM Rational RequisitePro. http://www-306.ibm.com/software/awdtools/reqpro/ (2007). Accessed 21-Dec-2007

  • Kaiya, H., Saeki, M.: Ontology based requirements analysis: lightweight semantic processing approach. In: Proc. of The 5th Int. Conf. on Quality Software, pp. 223–230. IEEE, New York (2005)

    Google Scholar 

  • Kamsties, E., Berry, D., Paech, B.: Detecting ambiguities in requirements documents using inspections. In: Proc. of WISE’01, pp. 68–80 (2001)

  • Kiyavitskaya, N., Zeni, N., Mich, L., Breaux, T.D., Anton, A.I., Mylopoulos, J.: Extracting rights and obligations from regulations: towards a tool-supported process. In: Proc. of ASE’07, pp. 429–432. ACM, New York (2007a)

    Google Scholar 

  • Kiyavitskaya, N., Zeni, N., Mich, L., Cordy, J.R., Mylopoulos, J.: Text mining through semi automatic semantic annotation. In: Proc. of PAKM’06. LNCS, vol. 4333, pp. 143–154. Springer, Berlin (2006)

    Google Scholar 

  • Kiyavitskaya, N., Zeni, N., Mich, L., Cordy, J.R., Mylopoulos, J.: Text mining through semi automatic semantic annotation. In: Proc. of ENTER 2007 (2007b)

  • Massacci, F., Mylopoulos, J., Zannone, N.: An ontology for secure socio-technical systems. In: Handbook of Ontologies for Business Interaction. The IDEA Group (2007)

  • Massacci, F., Prest, M., Zannone, N.: Using a security requirements engineering methodology in practice: the compliance with the Italian Data Protection Legislation. CSI 27(5), 445–455 (2005)

    Google Scholar 

  • Massacci, F., Zannone, N.: Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank. In: Social Modeling for Requirements Engineering. MIT Press, Cambridge (2008, to appear)

  • Mich, L., Garigliano, R.: NL-OOPS: A Requirements Analysis tool based on natural language Processing. In: Proc. of 3rd Int. Conf. on Data Mining, pp. 321–330 (2002)

  • Nobata, C., Sekine, S.: Towards Automatic Acquisition of Patterns for Information Extraction. In: Proc. of Int. Conf. of Computer Processing of Oriental Languages (1999)

  • Ratchev, S.M., Urwin, E., Muller, D., Pawar, K.S., Moulek, I.: Knowledge based requirement engineering for one-of-a-kind complex systems. Knowl.-Based Syst. 16(1), 1–5 (2003)

    Article  Google Scholar 

  • Resnik, P.: Semantic similarity in a taxonomy: An information-based measure and its application to problems of ambiguity in natural language. Journal of Artificial Intelligence Research 11, 95–130 (1999)

    MATH  Google Scholar 

  • Robertson, S., Robertson, J.: In: Mastering the requirements process. ACM/Addison-Wesley, New York/Reading (1999)

    Google Scholar 

  • Sampaio, A., Chitchyan, R., Rashid, A., Rayson, P.: EA-Miner: a tool for automating aspect-oriented requirements identification. In: Proc. of ASE’05, pp. 352–355. ACM, New York (2005)

    Google Scholar 

  • Sampson, G., Babarczy, A.: Limits to annotation precision. In: Proc. of EACL’03 (2003)

  • Stone, A., Sawyer, P.: Identifying tacit knowledge-based requirements. Software 153(6), 211–218 (2006a). (IEE Proceedings)

    Google Scholar 

  • Stone, A., Sawyer, P.: Using pre-requirements tracing to investigate requirements based on tacit knowledge. In: Proc. of ICSOFT ’06, vol. 1, pp. 139–144. INSTICC Press (2006b)

  • van Lamsweerde, A., Dardenne, A., Delcourt, B., Dubisy, F.: The KAOS project: knowledge acquisition in automated specification of software. In: Proc. of the AAAI Spring Symposium Series, pp. 59–62 (1991)

  • van Lamsweerde, A., Willemet, L.: Inferring Declarative Requirements Specifications from Operational Scenarios. TSE 24(12), 1089–1114 (1998)

    Google Scholar 

  • Vargas-Vera, M., Motta, E., Domingue, J., Lanzoni, M., Stutt, A., Ciravegna, F.: MnM: Ontology driven semi-automatic and automatic support for semantic markup. In: Proc. of EKAW’02, vol. 2473, pp. 379–391. Springer, Berlin (2002)

    Google Scholar 

  • Yang, Y.: An evaluation of statistical approaches to text categorization. Inf. Retr. 1(1–2), 69–90 (1999)

    Article  Google Scholar 

  • Yu, E.S.K.: Modelling strategic relationships for process reengineering. Ph.D. thesis, University of Toronto (1995)

  • Zeni, N., Kiyavitskaya, N., Cordy, J.R., Mich, L., Mylopoulos, J.: Annotating Regulations Using Cerno: An Application to Italian Documents. In: Proc. of SREIS 2008, pp. 1437–1442. IEEE, New York (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nicola Zannone.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kiyavitskaya, N., Zannone, N. Requirements model generation to support requirements elicitation: the Secure Tropos experience. Autom Softw Eng 15, 149–173 (2008). https://doi.org/10.1007/s10515-008-0028-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10515-008-0028-6

Keywords

Navigation