A series of tutorials will be held in conjunction with RE'19 to develop skills in and advance awareness of requirements engineering practices. Tutorials will be held before the main conference on Monday - Tuesday, September 23 - 24, 2019.
Monday, September 23, 2019 | ||
---|---|---|
T05 | Requirements Reuse and Reusability: Product Lines, Cases and Feature‐Similarity Models (Half-day: Afternoon) | |
T07 | RE4CPS: Requirements Engineering for Cyber-Physical Systems (Half-day: Morning) | |
T08 | Using Metamodeling for Requirements Engineering: A Best-Practice with ADOxx (Half-day: Afternoon) | |
Tuesday, September 24, 2019 | ||
---|---|---|
T01 | Security Requirements Engineering: From TARA to PenTest (Half-day: Morning) | |
T02 | Usable and Secure Requirements Engineering with CAIRIS (Half-day: Afternoon) | |
T04 | Strategies for data and computation movements in fog computing (Half-day: Afternoon) | |
T06 | Specifying Requirements through Interaction Design (Half-day: Afternoon) |
T01 - Security Requirements Engineering: From TARA to PenTest
Cybersecurity is of a growing concern across industries. It is today not anymore nice to have, because systems are interconnected, and in one way or the other open for external penetration. Even worse security directly impacts functionality, user experience and safety, and thus has become subject to product liability. For instance, functional safety is not feasible without a concise approach to cover cyber security. OEMs and suppliers across industries must ensure an effective protection against manipulations of IT and SW systems. Key points in the development of protected E/E systems are the proper identification of security requirements, the systematic traceability of security functions, and a security validation to demonstrate that security requirements have been met. Based on our experiences with own product development and with client projects around the world, we will show typical challenges and highlight suitable security guidance. We show with concrete examples how these practices improve developing secure systems and how these activities can be performed efficiently. The tutorial brings the necessary underlying foundations of security requirements engineering. It will introduce to the basic RE concepts in cybersecurity, such as identifying assets, developing a Threat and Risk Analysis (TARA), deriving security requirements, and connecting them with the necessary traceability to design and test. A specific focus is given to novel test methods in cybersecurity which directly base upon RE techniques, such as Penetration testing and its link to misuse cases, abuse case and confuse cases. To facilitate good transfer of results, the tutorial will have two hands‐on interactive sessions, namely to develop a TARA with quality requirements engineering, and to derive a grey‐box PenTest with traceability to requirements.
Date
Tuesday, September 24, 2019 (Half-day: Morning)Presenter
Vector Consulting Services, Germany
T02 - Usable and Secure Requirements Engineering with CAIRIS
Software needs to satisfy a range of security, privacy, and usability requirements. Eliciting them entails using design techniques both within and outside Requirements Engineering, together with tool-support which can analyse and make sense of requirements and other design concepts as early stage designs evolve. This half-day tutorial introduces participants to CAIRIS, and how it can be used to engineer requirements for usable and secure software. Participants will be given the chance to use CAIRIS with selected usability and security design techniques, and learn how CAIRIS has and can be deployed in real-world projects.
Date
Tuesday, September 24, 2019 (Half-day: Afternoon)Presenters
Bournemouth University, UK
Bournemouth University, UK
T03 - Requirements Engineering in a highly uncertain and dynamic business environment: Lessons learned from the first 1000 days of a venture-capital-backed US startup [CANCELLED]
Learn about the many competing aims, challenges, and trade-offs involved in leading and doing Requirements Engineering (RE) in a highly dynamic and uncertain environment of a venture-capital-backed New York City startup Fr8Hub ( https://www.fr8hub.com ) which runs a marketplace for over-the-road logistics services across North America. How to set up RE roles, responsibilities, and processes in such an environment? How and why did these change during the first 1000 days of this business? Which concepts, methods, and tools from RE research worked, and why? Which ones we tried and failed to get results from? How does RE - representations, models, and elicitation, representation, validation, verification methods - interface with corporate strategy, finance, product design, engineering, marketing, sales, and business intelligence? How do the priorities of speed and scale influence how RE is organized and done? Which research questions did this fieldwork lead to? I will discuss these questions together with the audience during the tutorial, while showing actually applied RE methods, processes, and artifacts; I will be describing actual situations, find out potential courses of action with the audience, and describe actual choices we made, and their outcomes. Beyond the role of RE in those situations, the aim is to stimulate discussion about the use of long term fieldwork in RE research, what can be gained through it, and how this one worked out.
Date
Tuesday, September 24, 2019 (Half-day: Morning)Presenter
University of Namur, Belgium
T04 - Strategies for data and computation movements in fog computing
Fog computing is a continuum of resources between the cloud provider and the edge of the network. Such resources can be used to host data and computation that can be moved from the cloud provider to near the consumer in order to increase the quality of the services provided. This tutorial presents a method to select the best data or computation movement to be enacted. The tutorial is divided in three sessions. The first session introduces the fog computing architecture. The second session introduces data and computation movement: their challenges and the available technologies used to enact them. The third session presents the actual method. In particular, how the method uses a goal-based modelling language to define the requirements of consumers, the impact of data and computation movements on their requirements and how it permits to choose the best movement.
Date
Tuesday, September 24, 2019 (Half-day: Afternoon)Presenters
Polytechnic University of Milan, Italy
Polytechnic University of Milan, Italy
Polytechnic University of Milan, Italy
T05 - Requirements Reuse and Reusability: Product Lines, Cases and Feature‐Similarity Models
Several socio‐economic trends are increasing personalised customer demands. Suppliers are responding with mass customisation but the management of large‐scale cost‐effective software reuse remains a difficult challenge. Software reuse and reusability range from operational, ad‐hoc and short‐term to strategic, planned and long‐term. Often the focus of attention is just on code or low‐level design. This tutorial presents and compares two different requirementsled approaches. The first approach deals with requirements reuse and reusability in the context of product line engineering. The second approach deals with requirements reuse and reusability in the context of case‐based reasoning. Both approaches have different key properties and trade‐offs between the costs of making software artefacts reusable and the benefits of reusing them. To aid large‐scale development we have proposed a Feature‐Similarity Model, which draws on both approaches to facilitate discovering requirements relationships using similarity metrics. A Feature‐Similarity Model also helps with the evolution of a product line, since new requirements can be introduced first into a case base and then gradually included into a product line representation.
Date
Monday, September 23, 2019 (Half-day: Afternoon)Presenters
Vienna University of Technology, Austria
Glasgow Caledonian University, Scotland, UK
T06 - Specifying Requirements through Interaction Design
When the requirements and the interaction design of a system are separated, they will most likely not fit together, and the resulting system will be less than optimal. Even if all the real needs are covered in the requirements and also implemented, errors may be induced by human‐computer interaction through a bad interaction design and its resulting user interface. Such a system may even not be used at all. Alternatively, a great user interface of a system with features that are not required will not be very useful as well. This tutorial explains joint modeling of (communicative) interaction design and requirements, through discourse models and ontologies. While these models were originally devised for capturing interaction design, it turned out that they can be also viewed as precisely and comprehensively specifying classes of scenarios, i.e., use cases. In this sense, they can also be utilized for specifying requirements. User interfaces for these software systems can be generated semi‐automatically from our discourse models, domain‐of‐discourse models and specifications of the requirements. This is especially useful when user interfaces tailored for different devices are needed. So, interaction design facilitates requirements engineering to make applications both more useful and usable.
Date
Tuesday, September 24, 2019 (Half-day: Afternoon)Presenter
Vienna University of Technology, Austria
T07 - RE4CPS: Requirements Engineering for Cyber-Physical Systems
Cyber-Physical Systems (CPSs) connect the cyber world with the physical world through a network of interrelated elements, such as sensors and actuators, robots, and other computing devices. They are inspiring increasing number of beneficial applications in dependable sectors such as aviation, transportation, aerospace, healthcare. In requirements engineer’s viewpoint, the environment, the specification and the requirements are no longer independent, they become three integral concerns of a system. With CPSs, however, the trust assumptions about the environment are no longer fixed after deriving the specification and deployment. They face an open and continuously changing environment which poses challenges for RE. For such adaptive CPSs systems, environment must be treated as the first-class runtime concern. To deal with this concern, the abstraction of the environment should model the dynamic interactions. Furthermore, the interactive elements in the environment of a CPS are interrelated and these relationships cannot be neglected when deriving the specification of the dynamics especially to satisfy non-functional requirements such as timing, safety, security and privacy, etc. This tutorial will introduce an environment modelling based approach to engineering the requirements of CPSs. Extending the Problem Frames representations, this approach structures the model of the environmental elements and provides analysis methods for deriving and specifying requirements. We deliver this tutorial with a few supporting tools that assist the modelling and verification of the system specification, demonstrated with working examples in sufficient details. After the tutorial, participants will be able to work on the environment modelling requirements engineering from their own projects, with some hands-on experience and a good knowledge of some tool support.
Date
Monday, September 23, 2019 (Half-day: Morning)Presenters
Peking University, China
East China Normal University, China
Guangxi Normal University, China
The Open University, UK
T08 - Using Metamodeling for Requirements Engineering: A Best-Practice with ADOxx
Requirement elicitation, analysis, documentation, verification and validation demand for conceptual, domain-specific modeling methods to externalise knowledge of involved stakeholders. Integrated and consistent viewpoints on these models are an important analytical instrument within the requirements engineering (RE) process to provide relevant abstractions of the system designed. Requirements specification languages support this challenge by providing the needed expressiveness to describe complex information system from a business, technical and organisational point of view, nevertheless these languages focus on a particular aspect of the process. This results in the definition of decoupled requirement artefacts and do not allow a holistic analytical assessment. Consequently, horizontal and vertical integration of such languages on a syntactic and semantic level is required to provide an adequate abstraction for involved stakeholders including traceability within the requirements engineering process. The evolution in domain-specific conceptual modeling has led to the observation that model-based requirements engineering cannot be seen isolated anymore, but needs to be understood in the context of an organisation ecosystem. RE processes and results are effected and contribute to the organisational knowledge base. In addition, the fast-paced evolution and transformation of enterprises nowadays impacts RE needs and call for an effective way to reflect these changes and updates on method and language level. Modeling tools, as an instrument to establish IT support systematically for requirements engineering, usually focus on a particular aspect (e.g. UML to define the software architecture, BPMN to identify business and organisational aspects, or i* for non-functional requirements) within the process. These tools are fit for a specific purpose but currently do not (i) support the requirement engineering life cycle holistically, (ii) provide flexibility on syntactical and semantical level amend domain-specific characteristics and functionality, and (iii) provide analytical and management functionalities to trace changes or assess the impact across abstraction layers. The tutorial discusses meta-modeling as a concept to overcome these shortcomings. Flexible extension, composition and re-use patterns enable an efficient conceptual definition of adequate, integrated meta-models fit for a concrete challenge within the requirement engineering process. The opensource meta-modeling platform ADOxx is introduces as an experimentation environment for researchers and practitioners to realise their individual meta-models and model processing functionalities for requirements engineering, resulting in domain-specificmodeling tools. Specific emphasis is given to the practical nature of the tutorial: participants are encouraged to build their individual modeling tools in a hands-on setting and experiment with the capabilities of ADOxx to implement meta-models and model processing functionalities from scratch, specialise existing abstract fragments or compose and integrate available outcomes provided by the ADOxx.org community. The individual prototypes realised as part of the tutorial are available thereafter for further refinement, assessment and evaluation.
Date
Monday, September 23, 2019 (Half-day: Afternoon)Presenters
University of Vienna, Austria
Chonbuk National University, Republic of Korea
Babeş-Bolyai University, Romania
T09 - Working Session on CORE (Crowdsourcing an Ontology of Requirements Engineering approaches) [CANCELLED]
This working session will engage participants to develop an ontology of requirements engineering approaches. We actively seek both research and industry participation to harness the full breadth and depth of knowledge and experience of the RE community. Approaches will be mapped onto a two-dimensional chart; RE life-cycle and “maturity” of the approach (similar to Technology Readiness Level or “TRL”). Participants will propose approaches to be added to the chart and will collectively determine where each approach fits in the ontology. We will also identify the inputs to and outputs from each approach. This will allow us to show how approaches are related to one another. Attendees will benefit in a number of ways, both tangible and intangible. The session will be a rich learning environment in which ideas will be shared and new perspectives will emerge. The ontology itself will be a significant tangible asset that will provide an holistic overview of the RE domain. Participants will be able to identify approaches they can use, see areas ripe for new research and opportunities for collaboration. The session will be participatory, engaging and fun.
Date
Monday, September 23, 2019 (Full-day)Presenters
Independent requirements specialist, UK
Laing O’Rourke, UK
California State University Long Beach, USA and Adjunct Professor at Lappeenranta University of Technology (LUT), Finland.
University of Huddersfield, USA