The 3rd ACS/IEEE International Conference onComputer Systems and Applications, 2005.
DOI: 10.1109/aiccsa.2005.1387101
|View full text |Cite
|
Sign up to set email alerts
|

Software requirement risk assessment using UML

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
6
0

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…The method applies complexity analysis of components and connectors, expert judgments for severity analysis and Markov models to estimate the risk factor of the different system scenarios. A method for estimating risk in the early phases of design is proposed in [5], where the analysis is conducted at the requirements-level based on UML design specifications. In [149] the authors propose a framework that models cluster computing systems' availability based on UML design notations, and evaluates system availability by transforming the UML availability modeling into corresponding analytical models (e.g.…”
Section: Other Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…The method applies complexity analysis of components and connectors, expert judgments for severity analysis and Markov models to estimate the risk factor of the different system scenarios. A method for estimating risk in the early phases of design is proposed in [5], where the analysis is conducted at the requirements-level based on UML design specifications. In [149] the authors propose a framework that models cluster computing systems' availability based on UML design notations, and evaluates system availability by transforming the UML availability modeling into corresponding analytical models (e.g.…”
Section: Other Techniquesmentioning
confidence: 99%
“…The overall experience from the use of the threat-modeling tool 5 during the Statnett-07 trial to model threats "on-the-fly" compared to the previous approach, where the analyst team made the threat diagrams between workshop 1 and 2, were good. The threat diagrams capture threat scenarios in an intuitive manner and it seemed easy for the participants to relate to the diagrams and provide input during the brainstorming sessions.…”
mentioning
confidence: 99%
“…The steps of our requirement-risk assessment methodology are presented in This methodology has been published as [9] and has been applied on an illustrative case study in [10].…”
Section: Methodology For Estimating Requirements-based Risk Factorsmentioning
confidence: 99%
“…Thus, the work presented in this paper can be used for estimating severity of component/connector failures in reliability-based risk assessment methodology [2], and severity of scenario failures in performance-based risk assessment [6], and requirements-based risk assessment [7]. …”
Section: Pace Commissionmentioning
confidence: 99%
“…This process of estimating severity can be automated in development environments supporting UML by annotating the hazard analysis results and the cost of failure information in the UML diagrams. We use this methodology for reliability-based risk assessment [2], performance-based risk assessment [6], and requirement-based risk assessment of software systems [7].…”
mentioning
confidence: 99%