Skip to main content
Log in

Eliciting dependability requirements: a control cases based approach

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

At present, great demands are posed on software dependability. But how to elicit the dependability requirements is still a challenging task. This paper proposes a novel approach to address this issue. The essential idea is to model a dependable software system as a feedforward-feedback control system, and presents the use cases + control cases model to express the requirements of the dependable software systems. In this model, while the use cases are adopted to model the functional requirements, two kinds of control cases (namely the feedforward control cases and the feedback control cases) are designed to model the dependability requirements. The use cases + control cases model provides a unified framework to integrate the modeling of the functional requirements and the dependability requirements at a high abstract level. To guide the elicitation of the dependability requirements, a HAZOP based process is also designed. A case study is conducted to illustrate the feasibility of the proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Avizienis A, Laprie J C, Randell B, et al. Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Dependable Secur Comput, 2004, 1: 11–33

    Article  Google Scholar 

  2. Despotou G, Kelly T. The need for flexible requirements in dependable systems. In: Proceedings of the 4th International Workshop on Requirements for High Assurance Systems, Paris, 2005

    Google Scholar 

  3. Despoton G, Kelly T. Extending safety deviation analysis techniques to elicit flexible dependability requirements. In: Proceedings of the 1st IEE International Conference on System Safety, London, 2006. 29–38

    Chapter  Google Scholar 

  4. Gran B A, Fredriksen R, Thunem A P J. Addressing dependability by applying an approach for model-based risk assessment. Reliab Eng Syst Safety, 2007, 92: 1492–1502

    Article  Google Scholar 

  5. Lee S W, Gandhi R. Engineering dependability requirements for software-intensive systems through the definition of a common language. In: Proceedings of 13th IEEE International Conference on Requirements Engineering, Workshop on Requirements Engineering for High-Availability Systems, Paris, 2005. 40–48

    Google Scholar 

  6. Donzelli P, Basili V. A practical framework for eliciting and modeling system dependability requirements: experience from the NASA high dependability computing project. J Syst Softw, 2006, 79: 107–119

    Article  Google Scholar 

  7. Sommerville I. An integrated approach to dependability requirements engineering. In: Proceedings of the 11th Safety-Critical Systems Symposium, Bristol, 2003. 3–15

    Google Scholar 

  8. Cai K, Cangussu J W, Decarlo R A, et al. An overview of software cybernetics. In: Proceedings of the 11th Annual International Workshop on Software Technology and Engineering Practices, Amsterdam, 2003. 77–86

    Google Scholar 

  9. Goodwin G C, Graebe S F, Salgado M E. Control System Design. New Jersey: Prentice Hall, 2001

    Google Scholar 

  10. Rumbaugh J, Jacobson I, Booch G. The unified modeling language reference manual. 2nd ed. New Jersey: Pearson Higher Education, 2004

    Google Scholar 

  11. Environment, health and safety committee. Note on: hazard and operability studies (HAZOP). Version 2, 2007

  12. Pumfrey D J. The principled design of computer system safety analysis. Dissertation of Doctoral Degree. York: University of York, 1999

    Google Scholar 

  13. Laprie J C. Dependability computing and fault tolerance: concepts and terminology. In: Proceedings of the 15th Annual International Symposium on Fault-Tolerant Computing, Munich, 1985. 2–11

    Google Scholar 

  14. Jackson D. A direct path to dependable software. Commun ACM, 2009, 52: 78–88

    Article  Google Scholar 

  15. Chung L, do Prado Leite J C S. On non-functional requirements in software engineering. In: Lecture Notes on Computer Sciences 5600, 2009. 363–379

    Google Scholar 

  16. Mylopoulos J, Chung L, Yu E. From object-oriented to goal-oriented requirements analysis. Commun ACM, 1999, 42: 31–37

    Article  Google Scholar 

  17. Cysneiros L M, do Prado Leite J C S. Nonfunctional requirements: from elicitation to conceptual models. IEEE Trans Softw Eng, 2004, 30: 328–350

    Article  Google Scholar 

  18. Herrmann A, Paech B. MOQARE: misuse-oriented quality requirements engineering. Requir Eng, 2008, 13: 73–86

    Article  Google Scholar 

  19. Sindre G, Opdahl A L. Eliciting security requirements with misuse cases. Requir Eng, 2005, 10: 34–44

    Article  Google Scholar 

  20. Alexander I. Misuse case: use case with hostile intent. IEEE Softw, 2003, 20: 58–66

    Article  Google Scholar 

  21. Laibinis L, Troubitsyna E. Fault tolerance in use-case modeling. In: Proceedings of the 4th International Workshop on Requirements for High Assurance Systems, Paris, 2005

    Google Scholar 

  22. Zou J, Pavlovski C J. Control case approach to record and model non-functional requirements. Inf Syst E-Bus Manag, 2008, 6: 49–67

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhi Jin.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Liu, C., Wang, Y., Zhang, W. et al. Eliciting dependability requirements: a control cases based approach. Sci. China Inf. Sci. 57, 1–15 (2014). https://doi.org/10.1007/s11432-013-4865-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-013-4865-y

Keywords

Navigation