메뉴 건너뛰기




Volumn , Issue , 2010, Pages 95-104

Reliability and availability requirements engineering within the unified process using a dependability analysis and modeling profile

Author keywords

Fault trees; Misuse cases; Reliability and availability requirements; Unified modeling language profile; Unified Process

Indexed keywords

FAULT-TREES; MISUSE CASE; RELIABILITY AND AVAILABILITY; RELIABILITY AND AVAILABILITY REQUIREMENTS; UNIFIED PROCESS;

EID: 77954330900     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EDCC.2010.21     Document Type: Conference Paper
Times cited : (3)

References (32)
  • 1
    • 77954317331 scopus 로고    scopus 로고
    • Best current practice of software reliability engineering
    • M. R. Lyu, Ed. IEEE Computer Society Press, ch. 6
    • M. Donnelly, B. Everett, J. Musa, and G. Wilson, "Best current practice of software reliability engineering," in Handbook of Software Reliability Engineering, M. R. Lyu, Ed. IEEE Computer Society Press, 1996, ch. 6, pp. 219-254.
    • (1996) Handbook of Software Reliability Engineering , pp. 219-254
    • Donnelly, M.1    Everett, B.2    Musa, J.3    Wilson, G.4
  • 2
    • 0003707118 scopus 로고    scopus 로고
    • A. Abran, J. W. Moore, P. Bourque, and R. Dupuis, Eds., Los Alamitos, California: IEEE Computer Society, [Online]. Available
    • A. Abran, J. W. Moore, P. Bourque, and R. Dupuis, Eds., Guide to the Software Engineering Body of Knowledge. Los Alamitos, California: IEEE Computer Society, 2004. [Online]. Available: http://www.swebok.org/.
    • (2004) Guide to the Software Engineering Body of Knowledge
  • 8
    • 51849096343 scopus 로고    scopus 로고
    • The CRUTIAL architecture for critical information infrastructures
    • ser. LNCS 5135, R. de Lemos et al. Ed. Berlin Heidelberg
    • P. Verissimo, N. Neves, M. Correia, A. A. E. Kalam, and A. Bondavalli, "The CRUTIAL architecture for critical information infrastructures," in Architecting Dependable Systems V, ser. LNCS 5135, R. de Lemos et al., Ed., Berlin Heidelberg, 2008, pp. 1-27.
    • (2008) Architecting Dependable Systems V , pp. 1-27
    • Verissimo, P.1    Neves, N.2    Correia, M.3    Kalam, A.A.E.4    Bondavalli, A.5
  • 12
    • 31044434638 scopus 로고    scopus 로고
    • A practical framework for eliciting and modeling system dependability requirements: Experience from the NASA high dependability computing project
    • P. Donzelli and V. Basili, "A practical framework for eliciting and modeling system dependability requirements: Experience from the NASA high dependability computing project," Journal of System and Software, vol. 79, pp. 107-119, 2006.
    • (2006) Journal of System and Software , vol.79 , pp. 107-119
    • Donzelli, P.1    Basili, V.2
  • 15
    • 38049082909 scopus 로고    scopus 로고
    • A UML profile for developing airworthiness-compliant (RTCA DO-178B), safety-critical software
    • ser. LNCS. Springer-Verlag
    • G. Zoughbi, L. Briand, and Y. Labiche, "A UML Profile for Developing Airworthiness-Compliant (RTCA DO-178B), Safety-Critical Software," in Proceedings of Models 2007, ser. LNCS. Springer-Verlag, 2007, vol. 4735, pp. 574-588.
    • (2007) Proceedings of Models 2007 , vol.4735 , pp. 574-588
    • Zoughbi, G.1    Briand, L.2    Labiche, Y.3
  • 16
    • 34247277511 scopus 로고    scopus 로고
    • A UML Profile to model safety-critical embedded real-time control systems
    • Springer-Verlag Berlin Heidelberg
    • L. Shourong and A. Wolfgang, "A UML Profile to model safety-critical embedded real-time control systems," in Studies in Computational Intelligence (SCI). Springer-Verlag Berlin Heidelberg, 2007, vol. 42, pp. 197-218.
    • (2007) Studies in Computational Intelligence (SCI) , vol.42 , pp. 197-218
    • Shourong, L.1    Wolfgang, A.2
  • 20
    • 33750839637 scopus 로고    scopus 로고
    • Using obstacle analysis to identify contingency requirements on an unpiloted aerial vehicle
    • R. Lutz, S. Nelson, A. Patterson-Hine, C. Frost, D. Tal, and R. Harris, "Using obstacle analysis to identify contingency requirements on an unpiloted aerial vehicle," Requirements Engineering, vol. 12, no. 1, pp. 41-54, 2007.
    • (2007) Requirements Engineering , vol.12 , Issue.1 , pp. 41-54
    • Lutz, R.1    Nelson, S.2    Patterson-Hine, A.3    Frost, C.4    Tal, D.5    Harris, R.6
  • 22
    • 40449096402 scopus 로고    scopus 로고
    • Security requirements engineering: A framework for representation and analysis
    • C. Haley, R. Laney, J. D. Moffett, and B. Nuseibeh, "Security requirements engineering: A framework for representation and analysis," IEEE Transactions on Software Engineering, vol. 34, no. 1, pp. 133-153, 2008.
    • (2008) IEEE Transactions on Software Engineering , vol.34 , Issue.1 , pp. 133-153
    • Haley, C.1    Laney, R.2    Moffett, J.D.3    Nuseibeh, B.4
  • 26
    • 0037240812 scopus 로고    scopus 로고
    • Misuse cases: Use cases with hostile intent
    • I. Alexander, "Misuse cases: Use cases with hostile intent," IEEE Software, vol. 20, no. 1, pp. 58-66, 2003.
    • (2003) IEEE Software , vol.20 , Issue.1 , pp. 58-66
    • Alexander, I.1
  • 30
    • 85013962790 scopus 로고
    • Targeting safety-related errors during software requirements analysis
    • R. R. Lutz, "Targeting safety-related errors during software requirements analysis," in SIGSOFT FSE, 1993, pp. 99-106.
    • (1993) SIGSOFT FSE , pp. 99-106
    • Lutz, R.R.1
  • 32
    • 15944398393 scopus 로고    scopus 로고
    • A Software Fault Tree approach to requirement analysis of an intrusion detection system
    • G. Helmer, J. Wong, M. Slagell, V. Honavar, L. Miller, and R. Lutz, "A Software Fault Tree approach to requirement analysis of an intrusion detection system," Requirement Engineering, vol. 7, pp. 207-220, 2002.
    • (2002) Requirement Engineering , vol.7 , pp. 207-220
    • Helmer, G.1    Wong, J.2    Slagell, M.3    Honavar, V.4    Miller, L.5    Lutz, R.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.