Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2739011.2739016acmotherconferencesArticle/Chapter ViewAbstractPublication PageseuroplopConference Proceedingsconference-collections
research-article

A meta-model for context-patterns

Published: 10 July 2013 Publication History

Abstract

It is essential for building the right software system to elicit and analyze requirements. Writing requirements that can achieve the purpose of building the right system is only possible if the domain knowledge of the system-to-be and its environment is known and considered thoroughly. We consider this as the context problem of software development. In the past, we tackled this problem by describing common structures and stakeholders for several different domains. The common elements of the context were obtained from observations about the domain in terms of standards, domain specific publications and implementations. But the description of the structure of a context-pattern, especially in terms of its static structure, was not aligned. This inhibits relating context-patterns to form a pattern language. It is also difficult for inexperienced pattern creators to describe newly observed patterns without any guidance.
We propose a meta model for describing context-patterns. The meta model contains elements, which can be used to structure and describe domain knowledge in a generic form. These context-patterns can afterwards be instantiated with the domain knowledge required for software engineering. This work is based on already existing patterns, which we abstracted into a meta-model. We present our context-patterns, show how we used them to construct our meta-model, and provide an example of how to describe a context-pattern using our meta-model. We contribute this meta model as a basis for a pattern language for context elicitation.

References

[1]
Alexander, C. 1978. A Pattern Language: Towns, Buildings, Construction. Oxford University Press.
[2]
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G., Patterson, D. A., Rabkin, A., Stoica, I., and Zaharia, M. 2009. Above the clouds: A berkeley view of cloud computing. Tech. rep., EECS Department, University of California, Berkeley.
[3]
Arsanjani, A., Ghosh, S., Allam, A., Abdollah, T., Gariapathy, S., and Holley, K. 2008. SOMA: a method for developing service-oriented solutions. IBM Systems Journal 47, 3, 377--396.
[4]
Arsanjani, A., Zhang, L.-J., Ellis, M., Allam, A., and Channabasavaiah, K. 2007. Design an SOA solution using a reference architecture. Tech. rep., IBM. http://www.ibm.com/developerworks/library/ar-archtemp/.
[5]
Beckers, K., Côté, I., Faßbender, S., Heisel, M., and Hofbauer, S. 2013. A pattern-based method for establishing a cloud-specific information security management system. Requirements Engineering, 1--53.
[6]
Beckers, K. and Fassbender, S. 2012. Peer-to-peer driven software engineering considering security, reliability, and performance. In Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 2nd International Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2012). IEEE Computer Society, 485--494.
[7]
Beckers, K., Fassbender, S., Heisel, M., and Meis, R. 2012. Pattern-based context establishment for service-oriented architectures. In Software Service and Application Engineering. LNCS 7365. Springer, 81--101.
[8]
Beckers, K., Fassbender, S., Küster, J.-C., and Schmidt, H. 2012. A pattern-based method for identifying and analyzing laws. In Proceedings of the International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ). LNCS 7195. Springer, 256--262.
[9]
Bundestag Der Bundesrepublik Deutschland (Parliamentary Council of Federal Republic of Germany). 2009. Bundesdatenschutzgesetz (Federal Data Protection Act). available at: http://www.gesetze-im-internet.de/englisch_bdsg/federal_data_protection_act.pdf.
[10]
Fabian, B., Gürses, S., Heisel, M., Santen, T., and Schmidt, H. 2010. A comparison of security requirements engineering methods. Requirements Engineering -- Special Issue on Security Requirements Engineering 15, 1, 7--40.
[11]
Fernandez, E. B. and Pan, R. 2001. A Pattern Language for Security Models. In 8th Conference of Pattern Languages of Programs (PloP).
[12]
Fowler, M. 1996. Analysis Patterns: Reusable Object Models. Addison-Wesley.
[13]
Fowler, M. 2002. Patterns of Enterprise Application Architecture. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA.
[14]
Hafiz, M., Adamczyk, P., and Johnson, R. E. 2012. Growing a pattern language (for security). In Proceedings of the ACM international symposium on New ideas, new paradigms, and reflections on programming and software. Onward! '12. ACM, New York, NY, USA, 139--158.
[15]
ISO/IEC. 2005. Information technology - Security techniques - Information security management systems - Requirements. ISO/IEC 27001, International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC).
[16]
ISO/IEC. 2009. Information technology - Security techniques - Information security management systems - Overview and Vocabulary. ISO/IEC 27000, International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC).
[17]
Jackson, M. 2001. Problem Frames. Analyzing and structuring software development problems. Addison-Wesley.
[18]
Kreutzmann, H., Vollmer, S., Tekampe, N., and Abromeit, A. 2011a. Protection profile for the gateway of a smart metering system. Tech. rep., BSI.
[19]
Kreutzmann, H., Vollmer, S., Tekampe, N., and Abromeit, A. 2011b. Protection profile for the security module of a smart metering system. Tech. rep., BSI.
[20]
Larenz, K. 1983. Methodenlehre der Rechtswissenschaft 5. Ed. Springer.
[21]
Lua, E. K., Crowcroft, J., Pias, M., Sharma, R., and Lim, S. 2005. A survey and comparison of peer-to-peer overlay network schemes. IEEE Communications Surveys and Tutorials 7, 72--93.
[22]
Mell, P. and Grance, T. 2009. The NIST definition of cloud computing. Working Paper of the National Institute of Standards and Technology (NIST).
[23]
Niknafs, A. and Berry, D. M. 2012. The impact of domain knowledge on the effectiveness of requirements idea generation during requirements elicitation. In Requirements Engineering Conference (RE), 2012 20th IEEE International. 181--190.
[24]
Of Gas, O. and Markets, E. 2011a. Smart Metering Implementation Programme, Response to Prospectus Consultation, Design Requirements. Tech. rep., Office of Gas and Electricity Markets.
[25]
Of Gas, O. and Markets, E. 2011b. Smart Metering Implementation Programme, Response to Prospectus Consultation, Overview Document. Tech. rep., Office of Gas and Electricity Markets.
[26]
OPEN meter project. 2009. Requirements of AMI. Tech. rep., OPEN meter project.
[27]
OPEN node project. 2010. Evaluation of general requirements according state of the art. Tech. rep., OPEN node project.
[28]
OPEN node project. 2011. Functional Use cases. Tech. rep., OPEN node project.
[29]
Papazoglou, M. P., Traverso, P., Dustdar, S., and Leymann, F. 2008. Service-oriented computing: a research roadmap. Int. J. Cooperative Inf. Syst. 17, 2, 223--255.
[30]
Perepletchikov, M., Ryan, C., Frampton, K., and Schmidt, H. W. 2008. Formalising service-oriented design. Journal of Software 3, 2, 1--14.
[31]
Schwacke, P. 2003. Juristische Methodik mit Technik der Fallbearbeitung 4. Ed. Kohlhammer Deutscher Gemeindeverlag.
[32]
Toledano, M. D. D. 2002. Meta-patterns: Design patterns explained. Tech. rep.
[33]
Vaquero, L. M., Rodero-Merino, L., Caceres, J., and Lindner, M. 2008. A break in the clouds: Towards a cloud definition. Special Interest Group on Data Communication (SIGCOMM) Computer Communication Review 39, 1, 50--55.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
EuroPLoP '13: Proceedings of the 18th European Conference on Pattern Languages of Program
July 2013
384 pages
ISBN:9781450334655
DOI:10.1145/2739011
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 July 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. DomainKnowledge
  2. context establishment
  3. requirements engineering

Qualifiers

  • Research-article

Funding Sources

  • Ministry of Innovation, Science, Research and Technology of the German State of North Rhine-Westphalia and EFRE

Conference

EuroPLoP 2013

Acceptance Rates

EuroPLoP '13 Paper Acceptance Rate 24 of 36 submissions, 67%;
Overall Acceptance Rate 216 of 354 submissions, 61%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 122
    Total Downloads
  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Dec 2024

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media