NFRs and RE Processes

Lawrence Chung Department of Computer Science The University of Texas at Dallas

Non-Functional Requirements

Practices and Recommendations:

A Brief Synopsis

 Why  What  Some Classification Schemes

 NFRs and RE Processes  Product-Oriented Approach: Some Individual NFRs

 The NFR Framework  Appendix

 With Rational Unified Process and UML  With Volere Requirements Specification Templates  Others

Why Non-Functional Requirements (NFRs )?

 Consider a brochure from an automobile manufacturer:

 When you buy our car, you can now drive to a store…

 Consider a brochure from a cellular phone manufacturer:

 When you buy our cellular phone, you can now call your friend.

 Well, …

Lawrence Chung

NF Non-Functional Concerns drive just about everything

 With cellular phones:

“… enhancements enable the best possible operation

of your mobile … in various conditions .…

The earpiece fits in either ear allowing for convenient and reliable access to all basic call controls . ... To maximize call security , the headset also supports … the wireless connection for compatible … models.”

 With home networking:

“… is the total home networking solution … linking variety of digital home appliances as one. It enables you to enjoy convenient , pleasant , comfortable , and

reliable living environment at any time and any place .

Why NFRs ?

With CASE tool software:

The basic function is provision of some services

“… is a powerful, easy-to- use application definition platform used by business experts to quickly assemble functionally rich simulations of Web-based applications in a matter of hours . … Using the easy to learn, drag-and-drop paradigm …, business people can quickly lay out the page flow of simulations and create high fidelity pages that precisely mimic not

only the look and feel of the final application, …”

Lawrence Chung

But

Software is harder than hardware

Soft is harder to deal with than hard

F NF

NFR

What are Non-Functional Requirements ?

 -ilities : understandability, usability, modifiability, inter-operability, reliability,

portability, dependability, flexibility, availability, maintainability, scalability, (re- )configurability, customizability, adaptability, stability, variability, volatility, traceability, verifiability, predictability, compatibility, survivability, accessibility, …

 -ities : security, simplicity, clarity, ubiquity, integrity, safety, modularity, nomadicity, …  -ness : user-friendliness, robustness, timeliness, responsiveness, correctness,

completeness, conciseness, cohesiveness, …

…and there are many more

: convenience, comfort, performance,

efficiency, accuracy, precision, slim, esthetics, consistency, coherence, fault tolerance, self- healing capability, autonomy, cost, development time, time-to-market, long-lasting battery,

low coupling, …

soft

subjective, ambiguous, conflicting, global

NFRs: IEEE definition

“ non functional requirement – in software system

engineering, a software requirement that describes not what the software will do, but how the software will do it, for example, software performance requirements, software external interface requirements, design constraints, and software quality attributes. Nonfunctional requirements are difficult to test; therefore, they are usually evaluated subjectively.”

General Observations

“ non functional requirement – generally informally stated,

often contradictory, difficult to enforce during development and evaluate for the customer prior to delivery”

Lawrence Chung

NFR

NFRs:

subjective in both definitions & solutions

Classification is supposed to bring order into chaos, but ...

Classification 1 [Roman, IEEE Computer 1985]

6 classes + 2-3 levels

NFR

NFRs:

subjective in both definitions & solutions

Classification 2 - Process, Product and External considerations [Sommerville

3 classes + 2 levels

NFR

NFRs:

subjective in both definitions & solutions

Classification 3

3 classes + 3 levels

Note correlations

NFR

NFRs:

subjective in both definitions & solutions

Classification 4 4+ classes + 2 levels

Dimensions of Quality –Components of FURP +

[Grady1992]

F Feature set capabilities, security,

unctionality generality

U Human factors aesthetics, consistency,

sability documentation

Frequency/severity of failure,

R eliability

recoverability, predictability, accuracy,

MTBF

P Speed efficiency, resource usage,

erformance

throughput, response time Testability

S Configurability

upportability

Compatibility

Serviceability

Installability

Localizability

Robustness

NFR

NFRs:

subjective in both definitions & solutions

Classification 5

2 classes + 3 levels

Software Quality Tree [Boehm 1976]

Note correlations

robustness/integrity

consistency

as-is utility

efficiency

accountability

device efficiency

human engineering

general utility

accessibility

communicativeness

self-descriptiveness

testability

structuredness

maintainability

understandability

conciseness

legibility

modifiability

augmentability

NFR

NFRs:

subjective in both definitions & solutions

Relationship Between Design Adapted from [Brugge] Goals

Client (Customer, Sponsor)

Functionality End User

User -friendliness Low cost

Ease of Use

Increased Productivity

Runtime

Ease of learning Backward-Compatibility

Efficiency

Fault tolerant

Traceability of requirements

Robustness

Rapid development Flexibility

Reliability

Portability Good Documentation

Minimum # of errors Modifiability, Readability Reusability, Adaptability Well-defined interfaces

Developer/ Maintainer

NFRs & RE Processes:

Why?

Quality of product

Quality of Process

 Garbage in garbage out, so get the right requirements

P ro

 Garbage thru garbage out,

e so get the right process

ss

Product

So, know the input sources, specify process & specify product Evolution is inevitable – traceability is a virtue

Lawrence Chung

Approaches to NFRs

Measurement of products or systems is absolutely fundamental to the engineering process. I am convinced that measurement as practised in other engineering disciplines is IMPOSSIBLE for software engineering [Sommerville; http://www.utdallas.edu/~chung/SE3354Honors/IEEInaugural.pdf ]

 Product vs. Process?

The most important things can't be measured [Deming]

 Product-oriented Approaches

 Focus on system (or software) quality  Aim is to have a way of measuring the product once it’s built – metrics

 Process-oriented Approaches

 Focus on how NFRs can be used in the design process  Aim is to have a way of making appropriate design decisions

 Quantitative vs. Qualitative?

 Quantitative Approaches

 Find measurable scales for the quality attributes  Calculate degree to which a design meets the quality targets

 Qualitative Approaches

 Study various relationships between quality goals  Reason about trade-offs etc.

Not everything that can be counted counts, and not everything that counts can be counted.

Lawrence Chung

[Albert Einstein]

NFRs & RE Processes: So, where are NFRs in an RE Process?

 Before FRs?  After FRs?  At the same time with FRs?  …and what about Business objectives/goals, system

architectures, system models, SS, SRS, …? But, should we perhaps better know about the various relationships

between NFRS and such and such, before answering these questions,

more clearly,

understandably, concisely, precisely,

agreeably, …?

M , Prog |= S; G s , S, D |= R ;( G s , R , D |= G )V( G Lawrence Chung s , R , D |~ G); ( G |= ¬ P )V( G |~ ¬ P )

Product-oriented approaches

Lawrence Chung

Product-oriented approaches

Lawrence Chung

NFRs: Portability

• The degree to which software running on one platform can easily

be converted to run on another platform • E.g., number of target statements (e.g., from Unix to Windows) • Hard to quantify, since it is hard to predict what a “next

generation” platform might be like • Can be enhanced by using languages, OSs and tools that are

universally available and standardized. E.g., C/C++/C#/Java

J2EE/J2ME/.NET

Lawrence Chung

NFRs: Reliability

the ability of the system to behave consistently in a user-acceptable manner when operating within the environment for which the system was intended.

theory and practice of hardware reliability are well established; some try to adopt them for software

Availability = [ MTTF /( MTTF + MTTR )] x 100%

one popular metric for hardware reliability is mean-time-to-failure ( MTTF ) "Bathtub" curve characterizes MTTF :

Infant

Wear & tear

f Constant operation

of #

time

Infant mortality:

Given a large population of a particular component, many will fail soon after development due to inaccuracies in the manufacturing process;

Issues:

Do 2 different software copies have different characteristics? Does software wear & tear by decomposition?

Does software obey physical laws? Lawrence Chung

NFRs: Reliability

Sometimes reliability requirements take the form: "The software shall have no more than X bugs/1K LOC"

But how do we measure bugs at delivery time? seeded

original

 Bebugging Process - based on a Monte Carlo technique for statistical analysis of random events.

1. before testing, a known number of bugs ( seeded bugs) are secretly inserted.

2. estimate the number of bugs in the system

6 3. remove (both known and new) bugs. 114

seeded =

original

# of detected seeded bugs/ # of seeded bugs = # of detected bugs/ # of bugs in the system # of bugs in the system = # of seeded bugs x # of detected bugs /# of detected seeded bugs

Example: secretely seed 10 bugs (say, in 100 KLOC)

an independent test team detects 120 bugs ( 6 for the seeded)

# of bugs in the system = 10 x 120/ 6 = 200

190 – 114; 100000 – (190-114)/100000

# of bugs in the system after removal = 200 - 120 - 4 = 76

But , deadly bugs vs. insignificant ones; not all bugs are equally detectable; ( Suggestion [Musa87]: "No more than X bugs/1K LOC may be detected during testing"

"No more than X bugs/1K LOC may be remain after delivery, as calculated by the Monte Carlo seeding technique" Lawrence Chung

NFRs: Efficiency

refers to the level at which a software system uses scarce computational resources, such as CPU cycles, memory, disk space, buffers and communication channels

can be characterized along a number of dimensions: Capacity: maximum number of users/terminals/transactions ...

Degradation of service : what happens when a system with capacity X widgets per time unit receives X+1 widgets?

- Let the system handle the load, perhaps with degraded performance - Let the system crash

Timing constraints : Let stimulus refer to an action performed by the user/environment, and response refer to an action generated by the system.

- stimulus-response : e.g., "the system will generate a dial tone within 10 secs from the time the phone is picked up" - response-response : e.g., "the system will record that the phone is in use no later than 1 micro-second after it had

generated a dial tone"

- stimulus-stimulus : e.g., "the user will type her password within 15 secs from typing her login name" - response-stimulus : e.g., "the user will start dialing the phone number within 1 minute from getting the dial tone" Lawrence Chung

NFRs: Usability

 broadly – quality; fit to use narrowly - good UI

 Usability inspection : finding usability problems in UI design, making recommendations for fixing them, and

improving UI design.  Heuristics: a set of criteria against which usability of UI design is evaluated  "9 usability heuristics" [Nielsen90]

• Promptness no undue delay in accepting info items and responding to requests • Tolerance no hang-ups against errors, delays, unexpected behavior, etc. • Guidance providing guidance for correcting errors, generating reminders, etc. • Coherence ... ...

 "10 usability heuristics" [Molich and Nielsen90] • Simple and natural dialogue; Speak the user’s language • Minimize the user’s memory; Consistency; Feedback • Clearly makred exits; Shortcuts • Precise and constructive error messages; Prevent errors • Help and documentation

Lawrence Chung

NFRs: Usability

 All users will be satisfied with the usability of the product.  95% of all users will be satisfied with the usability of the product.

 95% of the users will be able to complete representative tasks without requiring assistance (e.g., modifying exclusion date set)  95% of the users will be able to complete representative tasks by the third attempt without requiring assistance

 95% of the users will be able to complete tasks X Y Z by the third attempt without requiring assistance

 95% of the users will be able to complete tasks X Y Z in less than 10 minutes without requiring assistance

 95% of the users will be able to complete task X in less than 10 minutes without requiring assistance  80% of the users will be able to complete task Y in less than 10 minutes

 77% of the users will be able to complete task Z in less than 5 minutes

Lawrence Chung

Non-Functional Requirements

Practices and Recommendations:

A Brief Synopsis

 Why  What  Some Classification Schemes

 NFRs and RE Processes  Product-Oriented Approach: Some Individual NFRs

 The NFR Framework  Appendix

 With Rational Unified Process and UML  With Volere Requirements Specification Templates  Others

Non-Functional Requirements

What - Essential Concepts

G : goals

D: a model of the environment

R: a model of the requirements a c

ts p u

c o n s tr a ins

satisfy o

S: a model of

the sw behavior Fn NFn

WRS

S, Ac, D ╞ R with S, Ac, D |≠ false

R, As, D ╞ G with R, As, D |≠ false softgoal satisficing

M , Prog |= S; G s , S, D |= R ;( G s , R , D |= G )V( G s , R , D |~ G); ( G |= ¬ P )V( G |~ ¬ P )

NFRs:

functional vs. non-functional : a mathematical perspective

• (mathematical) function:

f 1 : I -> O

F: I O

add: 2, 5 f 7

2 : I 1 X I 2 -> O

e.g.: sum: R X R -> R • non-functional:

– How fast can it be done? – How precise is the answer? – How easy is it to figure out how to use it?

– How robust is it concerning the 2 input of f 2 ?

nd

– Who can use it? – Can it be changed easily ? – How much would it cost to design and implement it?

Lawrence Chung

NFRs:

functional vs. non-functional : a mathematical perspective

 (mathematical) function:

f(x, y) = f 1 (f 2 (x), f 3 (y))

 non-functional:

n f(x, y) = n f 1 ( n f 2 (x), n f 3 (y)) n f(x, y) = n f 1 ( n f 2 ( n (x)), n f 3 ( n (y)))

Global nature

Lawrence Chung

NFRs:

subjective, graded, interacting

 Subjective vs. objective: subjective

objective  Graded:

worse better expensive

cheaper slower

faster  Interacting:

 Conflicting: the whole is less than the sum of its parts  Synergistic: the whole is more than the sum of its parts

Lawrence Chung

NFRs: subjective in both definitions & solutions

Classification 1 [Roman, IEEE Computer 1985]

Classification 2 - Process, Product and External

considerations [Sommerville 1992]

Classification 5 - Software Quality Tree

[Boehm 1976]

Lawrence Chung

NFRs:

subjective in both definitions & solutions

 Consider “security” – problem is subjective

 Protection of data alone, fine with Chris  Protection of data, and data availability, fine with Pat  Protection of data, and data availability, and data accuracy, fine with Alex  Protection of data, and data availability, and data accuracy, and filtering of viruses, fine

with Neo  Protection of data, and data availability, and data accuracy, and filtering of viruses, and

blocking adware, fine with Gail

 Consider “security” – solutions are subjective

A password authentication fine with Chris

A password authentication, with periodic change, fine with Pat

A password, together with a fingerprint verification, fine with Alex

A password, with a fingerprint verification rechecked every hour, fine with Neo

A password, with a fingerprint verification rechecked every hour, and co-presence of two people, fine with Gail

Lawrence Chung

NFRs: subjective – and also relative in priorities

Lawrence Chung

NFRs:

graded in both definitions and solutions – and relative

very bad

bad

good

very good

worse

better

expensive

cheaper

slower

faster

 Protection of data alone good  A password authentication alone bad

 Protection of data alone << Protection of data, and data availability  A password authentication <<

A password, together with a fingerprint verification

Lawrence Chung

NFRs: interacting

 Conflicting: the whole is less than the sum of its parts

A password, with a fingerprint verification rechecked every hour, fine for security  Simplicity is the key for ease-of-use

 Synergistic: the whole is more than the sum of its parts

 A password, with a fingerprint verification rechecked every hour, fine for security  Restricted access is good for data accuracy

Lawrence Chung

Non-Functional Requirements

What - Essential Concepts

 non-functional,  subjective,  graded,  interacting

– and relative  - in both definitions & solutions

Non-Functional Requirements

How 1 - Essential Tasks

G : goals

D: a model of the environment

R: a model of the requirements a c

ts p u

c o n s tr a ins

satisfy o

S: a model of

the sw behavior Fn NFn

WRS

S, Ac, D ╞ R with S, Ac, D |≠ false

R, As, D ╞ G with R, As, D |≠ false softgoal satisficing

M , Prog |= S; G s , S, D |= R ;( G s , R , D |= G )V( G s , R , D |~ G); ( G |= ¬ P )V( G |~ ¬ P )

NFRs:

functional vs. non-functional : a mathematical perspective

 (mathematical) function:

f 1 : I -> O

f(x, y) = f 1 (f 2 (x), f 3 (y))

f 2 : I 1 X I 2 -> O

n f(x, y) = n f 1 ( n f 2 (x), n f 3 (y))

e.g.: sum: R X R -> R = n f1( n f2( n (x)), n f3( n (y)))

 non-functional:

 How fast can it be done? Fast , Fast (f), Fast (f 2 )

 How precise is the answer? Precise , Precise (f), Precise (O)

 How easy is it to figure out how to use it?

Easy-to-learn , Easy-to-learn (f), Easy-to-learn (f 2 ), Easy-to-learn (x)

 How robust is the input? Robust , Robust (I 1 ) , Robust (I 2 )

 Who can use it? Security , Security (f), Security (I), Security (O), Security (f 2 ), Accessibility , Accessibility (f), Accessibility (O)

 Can it be changed easily ?

Changeability , Changeability (f), Changeability (f 2 )

 How much would it cost ?

Cost , Design-cost (f), I mplementation-cost Lawrence Chung (f), Testing-cost (f 2 )

NFR

The NFR Framework

Chung, Nixon, Yu and Mylopoulos, Non-functional Requirements in Software Engineering

Softgoal  No clear-cut definition and or criteria as to whether it is satisfied or not; NFRs are subjective, relative, and interdependent  No optimal solution

 satisficing

 One softgoal can contribute positively or negatively , fully or partially , towards other softgoals (i.e., achieved not absolutely but within acceptable limits).

Softgoal Interdependency Graphs (SIGs)

 For modeling non-functional requirements and interdependencies between them

Labeling (evaluation) procedure  To determine the degree to which softgoals/contributions are satisficed

Catalogues

for knowledge of NFR satisficing and correlations, much like patterns for design

NFRs act as the basis for exploring alternatives and as the criteria for selecting among alternatives, hence for rationalization

Qualitative in nature, Process oriented

The NFR Framework

Softgoal Interdependency Graph (SIG): Three types of refinements

Softgoal types: 

NFR 

Operationalizing 

Claim (supporting/explaining a choice) !!Good Performance [WS] Formal Softgoal := Priority Type [Topic]

Decompose

contribution types: 

AND (decomposition) 

OR (alternatives)

Minimum Response Time [WS]

Minimum Space [WS]

-- Argument

Make >> Help >> Hurt >> Break

Use Indexing [WS]

Label types  satisficed

Claim [“Expected size of data is small;  denied

hence use of indexing won’t  conflicting

significant increase space  undetermined

consumption”]

The NFR Framework

Qualitative in nature, Process oriented

Secure Accounts

NFR softgoal

Sub-goals Availability of

Accounts

Secure Accounts Integrity of Accounts

Confidentiality of Accounts

Availability of Accounts

Integrity of Accounts

Confidentiality of Accounts

next slide

Lawrence Chung

The NFR Framework

Softgoal Interdependency Graph (SIG)

previous slide

Softgoal types : NFR Accuracy [Acct]

Operationalizing (satisficing technique) Claim (supporting/explaining a choice) Accuracy

Accuracy

[PremierAcct]

Accuracy [RegularAcct]

Softgoal := Informal Sg| Formal Sg

[GoldAcct]

Formal Sg := Type [Topic]

Accuracy [GoldAcct.credit]

Contribution types Accuracy :

!Accuracy [GoldAcct.debit]

AND (decomposition) [GoldAcct.highSpending] OR (alternatives) Claim [one of vital few]

Make >> Help >> Hurt >> Break

Validation

Auditing

[GoldAcct.highSpending]

Labels (evaluation of softgoals/contributions)

[GoldAcct.highSpending]

satisficed denied ValidatedBy

Destroy

[GoldAcct.highSpending,

conflicting

[GoldAcct.highSpending.history]

class-I-secretary]

undetermined

Claim [past experience…]

Available Available [class-I-secretary] Available [policy-on-spending-pattern]

Claim [policy of rigorous

[GoldAcct.highSpending]

exam. on high spending] Lawrence Chung

The NFR Framework

[J. Mylopoulos, L. Chung, E. Yu, " From object-oriented to goal-oriented requirements analysis ", CACM, pp31-37.ACM Press]

Example: A small portion of a hospital model for requirements analysis Softgoal Interdependency Graph (SIG)

Object Model

From Softgoals to Use Cases

G : goals

D: a model of the environment

R: a model of

the requirements a c ts

s tr o a S: a model of c o n the sw behavior

in

satisfy n

Fn NFn WRS

S, Ac, D ╞ R with S, Ac, D |≠ false

Lawrence Chung

R, As, D ╞ G with R, As, D |≠ false

NFRs:

subjective in both definitions & solutions

 Know at least what you mean - decompose

security

performance

Integrity Confidentiality Availability

Lawrence Chung

NFRs:

subjective in both definitions & solutions

 Know at least what you mean as precisely as possible - as many decompositions as needed

Confidentiality Availability

Space-P

Responsive

Accuracy Completeness

Response-T Throughput

+Coverage -Coverage

Lawrence Chung

NFRs:

subjective in both definitions & solutions

 Know at least what you mean as precisely as possible - as many decompositions as needed

authentication

indexing

password fingerprint

Single Multiple Keyword-based Category-based password passwords

indexing

indexing

Single password Several multiple checks Lawrence Chung

different passwords

NFRs:

subjective in both definitions & solutions

Know at least what you mean as precisely as possible - as many decompositions as needed

performance Integrity

security

Time-P

Responsive Accuracy

Confidentiality Availability

Space-P

Completeness

Response-T Throughput

+Coverage -Coverage

Operationalize

authentication indexing

indexing Single

indexing

Multiple Keyword-based Category-based

password passwords

indexing Single password Several

indexing

multiple checks Lawrence Chung different passwords

NFRs: non-functional …and… functional

 Know at least what you mean – decompose

 Relate Functional and Non - functional sides

Confidentiality Availability

password fingerprint

Lawrence Chung

NFRs: non-functional …and… functional

Know at least what you mean – decompose

Relate Functional and Non-functional sides

Be as specific about the scope/topic/parameter: from global to local

security

Home networking

Confidentiality Availability

Home

Door

Security Networking

Contoller

authentication

Lighting password

Oven

fingerprint

Password+ fingerprint

Security

Security [Home Networking]

Security [Garage Door, Home Networking]

Authentication authentication [Home Networking] authentication [Garage Door, Home Networking]

Lawrence Chung

NFRs: non-functional …and… subjective in both definitions & solutions

Know at least what you mean – decompose

Relate Functional and Non-functional sides

Different functional operationalizations contribute differently

Home Information

networking security

Physical security

Confidentiality Availability

Home

Door

Security Networking

Contoller

authentication

Lighting password

Oven

fingerprint

Password+ fingerprint

Make >> Help >> Hurt >> Break

“Satisficing” (cf. Nilsson’s)

Lawrence Chung

NFRs:

graded in both definitions and solutions – and relative

Explore alternatives – some are better/worse than others

Password+ fingerprint

Lawrence Chung

NFRs:

graded in both definitions and solutions – and relative

Explore alternatives – some are better/worse than others

Different alternatives may have different degrees of contributions

Make >> Help >> Hurt >>

“Satisficing” (cf. Nilsson’s)

Break security

Password+ fingerprint

+ Indivisual

Shared password

password Lawrence Chung

NFRs: interacting

 Conflicting: the whole is less than the sum of its parts  Synergistic: the whole is greater than the sum of its parts

Confidentiality Availability

Time-P Space-P Responsive

indexing

authentication

password Single-level Multi-level fingerprint

Password+

indexing indexing

fingerprint

Lawrence Chung

NFRs: interacting – graded/relative

 Different techniques thru nfr-operationalizations have different impacts (cf. fr-operationalizations)

Confidentiality Availability

Time-P Space-P Responsive

indexing

authentication

password Single-level Multi-level fingerprint

Password+

indexing indexing

Lawrence Chung

NFRs: interacting – graded and relative

 Through functional choices ( fr-operationalizations )

ease-of-use Home

Information networking

security Physical security

Integrity

Home ConfidentialityAvailability

Networking Security Contoller

authentication

Lighting password

Oven

fingerprint Password+

Lawrence Chung

NFRs: interacting – graded/relative

 Different techniques have different impacts

 Prioritize

Confidentiality Availability

Time-P Space-P Responsive

indexing

authentication

password Single-level Multi-level fingerprint

Password+

indexing indexing

Lawrence Chung

NFRs: interacting – graded and relative

 Through functional choices

 Prioritize

ease-of-use

Home Information

networking security

Physical security

Integrity

Home ConfidentialityAvailability

Networking Security Contoller

authentication

Lighting password

Oven

fingerprint Password+

fingerprint

Ordinary people

Fixed

Variable

 Claims

experience difficulties Lighting

Lighting

No reported

 Evaluate Due to fixed lighting

with the sequencing

break-in incidents

thru propagation of labels (satisficed, denied) Lawrence Chung

Softgoal Interdependency Graph (SIG):

Evaluation Thru Label Propagation

Quiz:

healthy

elixir

bomb U

Label types  satisficed

Make >> Help >> Hurt >> Break

AND

 denied  conflicting

OR

 undetermined

Softgoal Interdependency Graph (SIG):

Evaluation Thru Label Propagation

Quantitative evaluation as a function of numeric values for labels and priorities. e.g,

Label types

Priorities

 satisficed

!! Make Very important >> Help >> Hurt >> Break AND

 denied

! Important

 conflicting

OR

 undetermined

Softgoal Interdependency Graph (SIG): Summary of Modeling Concepts

 Softgoals: NFR Softgoals, Operationalizing Softgoals, Claim Softgoals

Integrity No reported

password

break-in incidents due to fixed lighting

Softgoals ::= Priority Type [topic list] Label

Garage

Door

 Contributions:

 AND Make >> Help >> Hurt >> Break

OR

 “Satisficing”

Lawrence Chung

Softgoal Interdependency Graph (SIG): Semantics

 Proposition = Softgoal U Contribution

Lawrence Chung

Softgoal Interdependency Graph (SIG): Semantics

HURT HELP

If satisficed( HURT HELP (G

0 ,G 1 )) then there exist propositions G 2 , …, G n such that

Und (G 0 ,G 1 )= MAKE (G 0 ,G 1 ) HELP(G 0 ,G 1 )

HURT (G 0 ,G 1 )

BREAK (G 0 ,G 1 )

Lawrence Chung

Softgoal Interdependency Graph (SIG): Process of Construction

An iterative, interleaving process!!!

 Post NFR Softgoals:  Refine NFR Softgoals as many times until the meaning is clear

 Refine the type  Refine the topic list  Refine the priority

 Operationalize NFR Softgoals  Refine Operationalizing Softgoals as many times until all the parts and

relationships are designed (N.B: recall “one person’s floor is another person’s ceiling”)  Refine the type

 Refine the topic list  Refine the priority

 Provide justifications in terms of Claim Softgoals, for any kind of softgoals  Evaluate the degree to which each softgoal is satisficed.

Lawrence Chung

The NFR Framework:

Reuse of Knowledge of NFRs

 Introduces Catalogues of NFRs much like patterns for design are built

 Methods:  Correlation Rules:

Security

User-friendliness [topic]

Claim[“MIL Std”]

Claim[“common practice”]

Claim[“Some people feel like

Claim[“in commercial application,

criminal treatment”]

Claim[“Some people feel like Integrity Confidentiality

accuracy could be the main concern”]

VIP treatment”] [topic] [topic]

User-friendliness [weaponry-info]

Confidentiality

[weaponry-info]

[access to weaponry-info]

Claim[“MIL Std”]

Claim[“common practice”]

Claim[“Some people feel like criminal treatment”]

Claim[“Some people feel like Integrity

VIP treatment”] [weaponry-info]

Confidentiality

Availability

[weaponry-info] [weaponry-info]

Authentication

Fingerprint-verification

Lawrence Chung [weaponry-info]

[access to weaponry-info]

The NFR Framework

{Chung et.al.} Non-functional Requirements in Software Engineering [Sullivan07 lecture notes]

 Patterns:

Lawrence Chung

The NFR Framework

and the Reference Model

Recall:

Example 1: Patient Monitoring

a-fib.com

D 1 : There will always be a nurse close C – with a microphone

enough to hear the buzzer

as a sensor and a D

2 : The sound from the heart falling

S : If the sound from the sensor

buzzer as an actuator

below a certain threshold indicates

falls below a certain threshold,

that heart has (is about to) stop

the buzzer shall be actuated

R 1 : A warning system notifies the nurse

P - Program

if the patient’s heartbeat stops

Designation Categories:

e h : the nurse and the heartbeat of the patient. e v : sounds from the patient’s chest. s v : the buzzer at the nurse’s station. s h : internal representation of data from the sensor.

Lawrence Chung

Recall:

The NFR Framework

and the Reference Model

Example 1: Patient Monitoring

a-fib.com

Need: monitoring if a patient’s heart is failing Problem: monitoring if a patient’s heart is failing is difficult and

sometimes has been unsuccessful

A nurse cannot stay close to the patient always and on alert

well qualified and capable best quality patient care best quality

D1: There will always be a nurse close

C – with a microphone

enough to hear the buzzer

as a sensor and a

D2: The sound from the heart falling

S1: If the sound from the sensor

buzzer as an actuator

below a certain threshold indicates

falls below a certain threshold,

that heart has (is about to) stop

the buzzer shall be actuated

R1: A warning system notifies the nurse

clear

P - Program

if the patient’s heartbeat (is about to) stop

low-cost, low-maintenance, easily configurable, proven truly

in a safe and secure manner, but loud enough well qualified and capable

asap

best quality

Designation Categories:

e h : the nurse and the heartbeat of the patient. e v : sounds from the patient’s chest. s v : the buzzer at the nurse’s station. s h : internal representation of data from the sensor. Lawrence Chung

The NFR Framework

in relation to the Reference Model, KAOS, Tropos

 WRSPM:  KAOS:

 The NFR Framework:

Fn

NFn

 nfr-operationalizations  fr-operationalizations

 Any phenomena/functional description, indicative or optative or expectational, and any agent can be associated with softgoals

G G  G satisficed (Q( S )), satisficed (Q( D )) ╞ satisficed (Q( R ))

G G  G satisficed (Q( P )), satisficed (Q( M )) ╞ satisficed (Q( S ))

M G , Prog G |= S G ;S G , D G |= R G ; R G , D G |= G ;( G |= ¬ P )V( G |~ ¬ P )

What the Metaphysics of Quality would do is take this separate category, Quality, and show how it contains within itself both subjects and objects.

The Metaphysics of Quality would show how things become enormously more coherent--fabulously more coherent--when you start with Lawrence Chung

an assumption that Quality is the primary empirical reality of the world.... [Robert Pirsig]

Recall

Property Preserving Evolution

2 G TO-BE 2

Recall

Property Preserving Evolution

2 G TO-BE 2

The NFR Framework

and the Reference Model

G 01 : best quality patient care G 02 : best quality monitoring of patient’s heart failure

R 1 : A warning system notifies the nurse if the patient’s heartbeat (is about to) stop

G R1.1 : low-cost, low-maintenance, easily configurable, proven (warning system) G R1.2 : fast (notification) G R1.3 : well qualified and capable (nurse)

R 1 ’: A warning system using the buzzer R 1 ’’: A warning system using the beeper

D1: There will always be a nurse close S1: If the sound from the sensor enough to hear the buzzer

falls below a certain threshold,

D2: The sound from the heart falling

the buzzer shall be actuated

below a certain threshold indicates G

S1 : clear (sound)

that heart has (is about to) stop

G S2 : in a safe and secure manner, and fast, but loud enough (buzzer activation) G D1.1 : well qualified and capable (nurse)

P – an implementation of S C – with a microphone

G P1 : low-cost, best quality (P)

as a sensor and a

buzzer as an actuator G C1 : best quality (sensor) G C2 : best quality (buzzer)

Lawrence Chung

The NFR Framework

From Specification to Architecture

G 01 : best quality patient care G 02 : best quality monitoring of patient’s heart failure

R 1 : A warning system notifies the nurse if the patient’s heartbeat (is about to) stop

G R1.1 : low-cost, low-maintenance, easily configurable, proven (warning system) G R1.2 : fast (notification) G R1.3 : well qualified and capable (nurse)

1 ’’: A warning system using the beeper

1 ’: A warning system using the buzzer D1: There will always be a nurse close

enough to hear the buzzer

S1: If the sound from the sensor

D2: The sound from the heart falling

falls below a certain threshold,

below a certain threshold indicates

the buzzer shall be actuated

that heart has (is about to) stop

G : clear (sound)

S1

D1.1

G : well qualified and capable (nurse)

G S2 : in a safe and secure manner, and fast, but loud enough (buzzer activation)

G P1 : low-cost, best quality (P)

inSignal

outSound

Functional components

Styles and stylistic components

Data[1..*]

Lawrence Chung

Non-Functional Requirements

How 2 – Dos and Don’ts

G : goals

D: a model of the environment

R: a model of the requirements c a

ts p u

a ins

satisfy o

tr n S: a model of n s the sw behavior c o

Fn NFn WRS

S, Ac, D ╞ R with S, Ac, D |≠ false R, As, D ╞ G with R, As, D |≠ false

softgoal satisficing

NFRs – Dos & Don’ts

Dos

Relate to FRs

 Don’ts

Clarify scope/topic

Identify agents, whenever useful

Absolute security, absolute reliabilty, absolute safety, ….

Discover relationships between definitions of

One definition fits all

NFRs

One solution solves all problems

Discover relationships between solutions to

The contribution is such and such, since I say so NFRs

Refine the definition only once

Refine definitions as many times as needed

Refine solutions as many times as needed  They are falling down from the sky

Prioritize

Dissociate from FRs

Discover conflicts

May be more important than FRs,

Safeguard against conflicts

but should consume less resources

Discover synergies

You name it; our system does it

Discover operationalizations as reasons for

No quantification, no existence

conflicts/synergies

Everybody needs the same

Determine strengths of contributions

Be only pessimistic

Justify strengths of contributions

Asking why “+” reveals ignorance

Explore alternatives

Beg the question

Discover solutions from requirements

Evaluate & only evaluate

Discover requirements from solutions

Brainwash nothing but objectivity

Consider use of multiple solutions

Consider scenarios

If necessary, quantify

Evaluate, …subjectively, …objectively

Establish traceability

Lawrence Chung

Conflict resolution 1

 Delete email w. any zip file attachment

-> misunderstanding betw. sender and receiver

<- move email w. any zip file attachment into a junk file folder -> If the receiver does not check the junk file folder, still misunderstanding

<- at the time the file is moved, notify this to the receiver

-> if the receiver still does not check the junk file folder or

checks it late, still misunderstanding

<- at the time the file is moved, notify the sender too -> If the receiver checks the junk file folder and opens it and the file is an attack,

still a security breach

Delete email w. any zip file attachment and block any future email from the same

sender

Lawrence Chung

Conflict resolution 2

 If the receiver opens email w. zip file and the file is an attack,

a security breach  Delete email any w. zip file attachment

-> misunderstanding betw. sender and receiver

<- move email w. any zip file attachment into a junk file folder -> If the receiver does not check the junk file folder, still misunderstanding

<- at the time the file is moved, notify this to the receiver

-> if the receiver still does not check the junk file folder or

checks it late, still misunderstanding

<- at the time the file is moved, notify the sender too -> If the receiver checks the junk file folder and opens it and the file is an

attack, still a security breach

 Delete email w. any zip file attachment and block any future email from the same sender

 If the email is from a sender who is not in the list of allowed senders, delete it  Leave the email but delete the attachment only

Lawrence Chung

Conflict resolution 3

Security[PC] -> S[email] -> S[sender] ^ S[recipient] ^ S[body] ^ S[attachment]

Denied (S[attachment]) -> denied (S[email]) -> denied (S[PC])

Zip(attachment] ^ attack(attachment) ^ open(attachment) -> denied (S[attachment]) /* If the receiver opens email w. zip file and the file is an attack, a security breach */

~ Zip(attachment] v ~attack(attachment) v ~open(attachment) -> ~ denied (S[attachment]) helps ~denied(S[email])

Delete email w. any zip file attachment -> misunderstanding betw. sender and receiver

<- move email w. any zip file attachment into a junk file folder -> If the receiver does not check the junk file folder, still misunderstanding

<- at the time the file is moved, notify this to the receiver

-> if the receiver still does not check the junk file folder or

checks it late, still misunderstanding

<- at the time the file is moved, notify the sender too -> If the receiver checks the junk file folder and opens it and the file is an attack,

still a security breach

Leave the email, but delete the attachment only

Leave the email, but delete the attachment only if it is an attack

Leave the email but change the name of the attachment to “…renameToZip”

If the email is from a sender who is not in the list of allowed senders, delete it Lawrence Chung

Conflict resolution 4

Security[PC] -> S[email] -> S[sender] ^ S[recipient] ^ S[body] ^ S[attachment]

Denied (S[attachment]) -> denied (S[email]) -> denied (S[PC])

Zip(attachment] ^ attack(attachment) ^ open(attachment) -> denied (S[attachment]) /* If the receiver opens email w. zip file and the file is an attack, a security breach */

~ Zip(attachment] v ~attack(attachment) v ~open(attachment) -> ~ denied (S[attachment]) helps ~denied(S[email])

Delete email w. any zip file attachment, at the time of reception -> misunderstanding betw. sender and receiver

<- move email w. any zip file attachment into a junk file folder -> If the receiver does not check the junk file folder, still misunderstanding

<- at the time the file is moved, notify this to the receiver

-> if the receiver still does not check the junk file folder or

checks it late, still misunderstanding

<- at the time the file is moved, notify the sender too -> If the receiver checks the junk file folder and opens it and the file is an attack,

still a security breach

Leave the email, but delete the attachment only

Leave the email, but delete the attachment only if it is an attack: detectable[attack(attachment)]

Leave the email but change the name of the attachment to “…renameToZip”

If the email is from a sender who is not in the list of allowed senders, delete it Lawrence Chung

NFRs – Where

 Wherever better/cheaper/faster/happier matters

 Requirements Engineering  System Architecting  Software Architecting  Design  Implementation  Validation & Verification  Testing  Maintenance  Software Process  Project Planning and Management  Configuration Management  Decision making

Lawrence Chung

NFRs – How to represent

From informal to tabular to visual (a la html->xml->oo-xml/eb- xml/…; CRC cards->classes; use cases & use case templates)

Dos

Bring in FRs

Clarify scope/topic

Name

Identify agents, whenever useful

Discover relationships between definitions of NFRs

Description

Discover relationships between solutions to NFRs

Type

Refine definitions as many times as needed

Refine solutions as many times as needed

Topic

Prioritize

Discover conflicts

Agent

Safeguard against conflicts

Discover synergies

Viewpoint

Discover operationalizations as reasons for conflicts/synergies

Determine strengths of contributions

Priority

Justify strengths of contributions

Explore alternatives

Affected NFRs

Discover solutions from requirements

Discover requirements from solutions Affecting NFRs/Operationalizations

Consider use of multiple solutions

Claim

Consider scenarios

If necessary, quantify

Sat Status

Evaluate

Evaluate subjectively

Evaluate objectively

Establish traceability

Lawrence Chung

Non-Functional Requirements

Practices and Recommendations:

A Brief Synopsis

 Why  What  Some Classification Schemes

 NFRs and RE Processes  Product-Oriented Approach: Some Individual NFRs

 The NFR Framework  Appendix

 With Rational Unified Process and UML  With Volere Requirements Specification Templates  Others

Appendix  Dependability

 RUP Specification  Volere Specification  How to Augment UML

softgoal satisficing

Lawrence Chung

Dependability

 Dimensions of Dependability

 Availability - The ability of the system to deliver services when requested  Reliability - The ability of the system to deliver services as specified  Safety - The ability of the system to operate without catastrophic failure  Security - The ability of the system to protect itself against accidental or

deliberate intrusion  Cost of development - Geometric rise in cost from low dependability to highest

 Effects of low dependability

 Often unused  Failure recovery costs may be high

Critical Systems

 Difficult to retrofit dependability

Safety critical

 Loss of information

Mission critical

 Business critical Repeatable improvement process helps

Dependability a key aspect

 CMM -SEI

A system failure causes

 More later

Significant economic loss

Physical damage

Lawrence Chung

Threat to or loss of human life

Dependability

Cost of failure

 Improve reliability

direct

Loss of life / Injury

 Fault avoidance

Loss of business

Fault detection and removal – testing and

Good will

 Fault tolerance - self checking and

Availability and Reliability

redundancy

Factors effecting

Environment office versus university

 Errors of this type are random

Perception (frequency of occurrence) 

Degrees  Remain after testing due to unforeseen

combinations of input or use

Failure - service that is expected is not

delivered

 Random based on user methods

Error – behavior that does not conform to the specification

 Not all inputs done the same

Fault – incorrect state – un-anticipated

 Learn to avoid

Human error  Therefore removal of some faults will not

improve perception

Lawrence Chung

Dependability - Safety

 Ability to operate normally or abnormally without threat to life or environment

 Methods to lessen chance of safety failure  Classes

Hazard avoidance

Primary safety critical  Embedded as controller

 Added control features (I.e. two man rule)  Secondary

 Hazard detection and removal

 There output could effect indirectly  Scans for known causes and cause preventive action other processes (CAD)

 Damage limitation (control)

 Reasons for less than 100% certainty  of fault tolerant/free Firewalls and other protective reactions to results

 Incomplete specification

 Terms

 Hardware malfunction – causing

 Accident

exceeded limits in software

Hazard

Incorrect input

 Damage  Hazard Severity  Hazard Probability  Risk

Lawrence Chung

Specification

 Safety

 Fault tree

IEC 61508 safety life cycle  Deductive – start with a hazard

 Inductive – start with failure

 Concept to death

Hazard analysis

 Fault tree starts with the failure and

Safety requirements definition

works backwards to potential causes

Planning , validation, development,

 Risk assessment

external risk reduction

– installation  Classifications

Separate safety validation

and commissioning

 Intolerable

O&M

 As low as reasonably practical

Decommissioning

(ALARP)

 Hazard and Risk Analysis

 Acceptable

 Iterative process

 For each hazard

Hazard Identification

 Probability

Hazard description

 Severity

Risk analysis and hazard classification

 Estimated risk

Risk assessment

 Risk reduction

Hazard decomposition

 Avoidance

Analysis as to potential causes (fault-tree analysis)

 Detection and removal

Risk reduction analysis

 Damage limitation

Preliminary safety requirements

Lawrence Chung

Dependability - Security

 Lack of security comprise to

availability and reliability

 Types

 Denial of service  Corruption of programs or data  Unauthorized disclosure

 Terms

 Security Specification

 Exposure

 Similar to safety

 Vulnerability

Impractical to specify

Attack  Threats

 Usually are “shall not”

 Controls

 Cycle in General

 Methods

 Asset ID and evaluation

 Vulnerability avoidance

Degree of importance

Detection and neutralization  Damage limitation

 Threat analysis and risk assessment  Threat assignment lists all threats against each

asset  Technology analysis what is available to counteract  Lawrence Chung Security specification

Specification

Requirements specification

Functional for error detection and recovery

Non functional for reliability and availability

Shall not requirements

Reliability specification

Decrease probability of failure

For a series of dependent components Pt = sum of P1 to Pn

 Non-functional reliability requirements

But if there are n replicated (redundant) and independent components then the Pt=pa to the nth

 ID type of failure to occur  Partition them into

Metrics for reliability

POFD probability of failure on demand .0001 = 1 on 10000

 Transient

Systems with unpredictable demand over long time

 Permanent

periods – emergency systems

 Recoverable

ROCOF Rate of failure occurrence 2/1000

 Unrecoverable

Systems with a regular demand atm/airline reservations

 Non-corrupting

MTTF Mean time to Failure avg time between observed

 Corrupting

failures 500 = avg of 1 in 500 time units

 Define the appropriate requirement (metric)

Systems with long transactions (auto save)

E.g. recoverable w/intervention – POFOD

AVAIL probability system is available at any given time

If automatic the ROCOF

.999 equals in every given 1000 time units system is likely to be

available for 999 of these

 Assign a proper metric as a functional

Systems of continuous service; tp switch

Lawrence Chung

reliability metric

NFRs:

With Rational Unified Process and UML

Home Appliance Control System

Vision

Version 1.2

Revision History

Date Version

Description

Author

Table of Contents

1.3 Definitions, Acronyms, and Abbreviations

5 4. Product Overview

5 4.1 Product Perspective 9 2. Positioning

5 4.2 Summary of Capabilities 10 2.1 Business Opportunity

5 4.3 Assumptions and Dependencies 11 2.2 Problem Statement

11 2.3 Product Position Statement

5 4.4 Cost and Pricing

6 4.5 Licensing and Installation 11 3. Stakeholder and User Descriptions

11 3.1 Market Demographics

6 5. Product Features

6 5.1 Start system

3.2 11 Stakeholder Summary 6 5.3 View status of system

5.2 Shutdown system

11 3.3 User Summary

5.4 Add a new group of sequences 12 3.4 User Environment

3.5 Stakeholder Profiles

3.5.2 Business Owner

8 6.1 Security

3.5.3 Customer Care

8 6.2 Usability

3.6 User Profiles

9 6.3 Responsiveness 15

3.7 Key Stakeholder or User Needs

6.4 Capacity

3.8 Alternatives and Competition

3.8.1 House Sitter

9 Appendix A. COTS Components 15

3.8.2 Home Security System and Monitoring Company Lawrence Chung 9

NFRs:

With Rational Unified Process and UML

6. Constraints 6.1 Security

Security for the HACS includes authentication, access control, data integrity, and data privacy. Authentication of the user is by identifier and password. Homeowners and Business Owners can monitor and change the state of the system. Customer Care users can only monitor the system and manually place a medical alert 911 emergency request for an ambulance. Transmissions should be encrypted for privacy

6.2 Usability Easy to use (especially safety related features) Request for an ambulance, police or fire truck needs to be at the push of a button or voice activated

6.3 Responsiveness

Dokumen yang terkait

Analisis Komparasi Internet Financial Local Government Reporting Pada Website Resmi Kabupaten dan Kota di Jawa Timur The Comparison Analysis of Internet Financial Local Government Reporting on Official Website of Regency and City in East Java

19 819 7

ANTARA IDEALISME DAN KENYATAAN: KEBIJAKAN PENDIDIKAN TIONGHOA PERANAKAN DI SURABAYA PADA MASA PENDUDUKAN JEPANG TAHUN 1942-1945 Between Idealism and Reality: Education Policy of Chinese in Surabaya in the Japanese Era at 1942-1945)

1 29 9

Improving the Eighth Year Students' Tense Achievement and Active Participation by Giving Positive Reinforcement at SMPN 1 Silo in the 2013/2014 Academic Year

7 202 3

Improving the VIII-B Students' listening comprehension ability through note taking and partial dictation techniques at SMPN 3 Jember in the 2006/2007 Academic Year -

0 63 87

The Correlation between students vocabulary master and reading comprehension

16 145 49

An analysis of moral values through the rewards and punishments on the script of The chronicles of Narnia : The Lion, the witch, and the wardrobe

1 59 47

Improping student's reading comprehension of descriptive text through textual teaching and learning (CTL)

8 140 133

The correlation between listening skill and pronunciation accuracy : a case study in the firt year of smk vocation higt school pupita bangsa ciputat school year 2005-2006

9 128 37

Transmission of Greek and Arabic Veteri

0 1 22

The correlation between synonym context clue and reading comprehension of English study program students of IAIN Palangka Raya - Digital Library IAIN Palangka Raya

0 2 27