2016 IEEE 24th International Requirements Engineering Conference (RE) 2016
DOI: 10.1109/re.2016.15
|View full text |Cite
|
Sign up to set email alerts
|

ResDevOps: A Software Engineering Framework for Achieving Long-Lasting Complex Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…En la etapa de codificación, las revisiones de código (Baum et al, 2016) son una actividad innovadora que permite crear productos más confiables y que reduce riesgos que propicien el fracaso de los proyectos. Así mismo, las revisiones de código mejoran enormemente la capacidad de los miembros del equipo de codificación (Pater et al, 2018) ya que permiten identificar nuevas ideas, técnicas y tecnologías para escribir código aumentando progresivamente su calidad (Furfaro et al, 2016).…”
Section: Reporte De La Revisiónunclassified
“…En la etapa de codificación, las revisiones de código (Baum et al, 2016) son una actividad innovadora que permite crear productos más confiables y que reduce riesgos que propicien el fracaso de los proyectos. Así mismo, las revisiones de código mejoran enormemente la capacidad de los miembros del equipo de codificación (Pater et al, 2018) ya que permiten identificar nuevas ideas, técnicas y tecnologías para escribir código aumentando progresivamente su calidad (Furfaro et al, 2016).…”
Section: Reporte De La Revisiónunclassified
“…36,37 In conclusion, a DevOps culture seems to be very attractive to organizations worldwide, being based in a "The faster you fail, the faster you recover" philosophy 14(p1) , enabling a culture of experimentation to release new products, services and software, allowing the organization to grow and to satisfy their customers. 38…”
Section: Research Backgroundmentioning
confidence: 99%
“…In addition, the methodology uses the graphical UML notation, which allows an easier process of communication and sharing among stakeholders. GOReM has already been successfully employed in the past in the context of industrial research projects, involving industrial partners such as ACI Informatica and Poste Italiane, and its practical application allowed to highlight and identify some interesting aspects during the requirements engineering phase …”
Section: Introductionmentioning
confidence: 99%
“…In particular, being a goal-oriented methodology, 12-14 GOReM allows to suitably derive the requirements from the analysis of (i) the goals of the involved stakeholders, (ii) the business scenarios, and (iii) the expected applications' models.*This paper is an extended version of the In addition, the methodology uses the graphical UML notation, which allows an easier process of communication and sharing among stakeholders.GOReM has already been successfully employed in the past in the context of industrial research projects, involving industrial partners such as ACI Informatica 15 and Poste Italiane, 16 and its practical application allowed to highlight and identify some interesting aspects during the requirements engineering phase. 17,18 In this paper, GOReM is exploited for supporting the conceptualization and subsequent implementation of cybersecurity compliance analysis services. In particular, after identifying the stakeholders involved in the SecaaS domain along with their goals, the security information and event management (SIEM) scenario, in which the Cloud Security Alliance (CSA) classifies cybersecurity compliance analysis services, is considered and two main application scenarios for cybersecurity compliance analysis are identified: (i) compliance analysis of an existing IT system/application, which aims at producing a report about the conformance of the system with respect to the cybersecurity rules and regulations in force as well as a set of indications on its possible enhancement; (ii) compliance analysis of an IT system/application under development, which aims at evaluating whether such system/application is able to meet security requirements coming from related cybersecurity rules and regulations.The paper presents and discusses both the application scenarios and, thanks to GOReM, provides a clear understanding of them so as to guide their concrete implementation.…”
mentioning
confidence: 99%