NON FUNCTIONAL REQUIREMENTS (NFRS) TRACEABILITY METAMODEL FOR AGILE DEVELOPMENT

Adila Firdaus, Imran Ghani, Dayang Norhayati Abg Jawawi, Wan Mohd Nasir Wan Kadir

Abstract


Agile methodologies are well known for early and frequent releases. Besides, these methodologies also handle requirement changes well without causing delays. However, it has been noticed that the functional requirements changes can affect the non-functional requirements (NFRs) such as security and performance. It is also possible that the agile team is not even aware of these effects causing dysfunctional system. This issue could be addressed by offering traceability mechanism that helps to trace the effect of functional requirement changes on the non-functional requirements. Unfortunately, a few researchers have conducted studies regarding this issue. Thus, this study attempts to present a Traceability Process Model (TPM) to tackle the issue of tracing NFR especially security and performance. However, to materialize a full scale TPM, a metamodel is necessary. Therefore in this paper, we present a metamodel by integrating two existing metamodels. Then we validate the newly built metamodel with precision and recall methods. Lastly, we also develop a traceability tool that is based on the proposed metamodel.


Keywords


Agile methodologies, security, performance, traceability, meta model, propagation

Full Text:

PDF

References


Breivold, H. P, D. Sundmark, P. Wallin, and S. Larsson 2010. What Does Research Say about Agile and Architecture. Fifth International Conference on Software Engineering Advances 32-37. Retrieved April 1, 2013

(http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5615620).

Abbors, F., J. Lilius, A Joukahaisenkatu, E. Fredrik Abbors, and D. Truscan. 2009. Tracing Requirements In A Model-Based Testing Approach. First International Conference on Advances in System Testing and Validation Lifecycle. 123-128.

Chung, L., B. A. Nixon. & Yu, E. 1996. Dealing with Change : An Approach Using Non-functional Requirements. Requirements Eng. 1: 238-260, 238-260.

Grau, R. 2012. Requirements Engineering in Agile Software Development. Software for People. Springer Berlin Heidelberg

Huang, J. C., A. Czauderna, and E. Keenan. 2013. A Persona-Based Approach for Exploring Architecturally Significant Requirements in Agile Projects. Requirements Engineering: Foundation for Software Quality. Springer Berlin Heidelberg.

Firdaus, A., Ghani, I, and Jeong, S. R. 2014. Secure Feature Driven Development (SFDD) Model for Secure Software Development. Procedia-Social and Behavioral Sciences. 129: 546-553.

Cao, L., Mohan, K., Ramesh, B., & Sarkar, S. 2013. Adapting Funding Processes for Agile IT Projects: An Empirical Investigation. European Journal of Information Systems. 22(2): 191-205.

VanderLeest, S., and A. Buter. 2009. Escape the Waterfall: Agile for Aerospace 28th Digital Avionics Systems Conference.

Grundy, J., J. Hosking, W. B. Mugridge, 2002. Inconsistency Management for Multiple-View Software Development Environments. Software Engineering, IEEE Transactions on. 24(11).

Gotel, O., C., Z., and Finkelstein, C.W, 1994. An analysis of the requirements traceability problem. In: Proceedings of the First International Conference on Requirements Engineering, pp. 94–101.

Reshef, A. N., R. F. Paige, J. Rubin, Y. Shaham-Gafni, and D. S. Kolovos.2005. Operational Semantics for Traceability In Proceedings of ECMDA Traceability Workshop, ECMDA-TW ’05, pages 8–14

Ajila, S., and A. B. Kaba. 2004. Using Traceability Mechanisms to Support Software Product Line Evolution. In Information Reuse and Integration, 2004. IRI 2004. Proceedings of the 2004 IEEE International Conference on IEEE. 157-162.

Chen, J. Y., & S. C. Chou. 1999. Consistency Management in a Process Environment. Journal of Systems and Software. 47(2): 105-110.

Huang, J. C. 2005. Toward Improved Traceability of Non-Functional Requirements. Proceedings of the 3rd International Workshop on Traceability in Emerging Forms of Software Engineering. ACM.

Kassab, M., and O. Ormandjieva. 2006. Towards an Aspect-Oriented Software Development Model with Tractability Mechanism. Trese.cs.utwente.nl. 1–8.

A. G. Kourie and B. W. Watson. 2003. Standards and Agile Software Development. Proceedings of SAICSIT 2003. 1-11.

Huang, J. C., O. Gotel, and A. Zisman. 2012. Software and Systems Traceability. 2(3). Springer.

Collins, E. F., and V. F. de Lucena. 2012. Software Test Automation Practices in Agile Development Environment: An Industry Experience Report. Automation of Software Test (AST). 7th International Workshop on. IEEE.

Julian, R., and J. Green. 2004. Automating Traceability For Generated Software Artifacts. Proceedings of the 19th IEEE International Conference on Automated Software Engineering. IEEE Computer Society.

Kassab, M., O. Ormandjieva, and Maya Daneva. 2009. A Metamodel for Tracing Non-functional Requirements. Computer Science and Information Engineering, 2009 WRI World Congress on. 7. IEEE.

Huang J. C., R. Settimi, O. BenKhadra, E. Berezhanskaya, and S. Christina. 2005. Goal Centric Traceability for Managing Non-Functional Requirements. Proceedings of the 27th International Conference on Software Engineering. 362-371

Kappel, G., Kargl, H.,Kramler, G., Schauerhuber, A., Seidl, M. Strommer, M., & Wimmer, M. 2007. Matching Metamodel with Sematics Systems-An Experience Report. Datebanksysteme in Business. Technologie und Web Workshop Proceedings, 5.-6 Marz, Aachen Germany. 38-52.

Firdaus A., Ghani I., and Yasin NIM. 2013. Developing Secure Websites Using Feature Driven Development (FDD): A Case Study. Journal of Clean Energy Technologies Issue. 1(4).

Inayat, I., Salim, S. S., Marczak, S., Daneva, M., & Shamshirband, S. 2014. A Systematic Literature Review on Agile Requirements Engineering Practices and Challenges. Computers in Human Behavior.

Azham Z., Ghani I., and Ithnin N. 2011. Security Backlog In Scrum Security Practices. Software Engineering (Mysec). 2011 5th Malaysian Conference in. 414-417.

Ghani I., Azham Z., and Jeong SR. 2014. Integrating Software Security into Agile-Scrum Method. KSII Transactions on Internet and Information Systems (TIIS). 8(2): 646-663.

Azham Z., Ghani I., and Ithnin N. 2011. Security Backlog In Scrum Security Practices. Software Engineering (Mysec). 2011 5th Malaysian Conference in. 414-417.




DOI: https://doi.org/10.11113/jt.v77.6191

Refbacks

  • There are currently no refbacks.


  

Copyright © 2012 Penerbit UTM Press, Universiti Teknologi Malaysia.
Disclaimer : This website has been updated to the best of our knowledge to be accurate. However, Universiti Teknologi Malaysia shall not be liable for any loss or damage caused by the usage of any information obtained from this web site.
Best viewed: Mozilla Firefox 4.0 & Google Chrome at 1024 × 768 resolution.