high-level requirements specification

Top PDF high-level requirements specification:

Requirements-Based Access Control Analysis and Policy Specification

Requirements-Based Access Control Analysis and Policy Specification

 ReCAPS offers prescriptive guidance for ACP specification with a rich set of heuristics. Although ReCAPS is essentially an analysis method with support of a set of heuristics and a tool, its most important contribution goes beyond that of a method. The new software development scheme that builds ACP specification as an explicit part of the software development process created by ReCAPS is significant. By integrating ACP specification with requirements analysis and software design, ReCAPS provides a basic framework for ensuring compliance between different levels of policies, system requirements and software design. The impact of this compliance is significant. One of the problems that plague companies and organizations is the degree of confidence they have in claiming that their information systems are enforcing security/privacy laws and global policies. This problem also plagues law enforcement agencies; currently there is a lack of technology to help them measure an organization’s accountability for enforcing laws. The ReCAPS approach is a promising step in the right direction towards solving these problems. First, we derive access control policies from system requirements and high-level security and privacy policies. Because the sources are where security requirements come from, this development scheme helps ensure that a software system is actually enforcing high-level security / privacy laws and policies. Second, we establish traceability links between high-level policies, system requirements, and access control policies. This traceability support helps ensure that any changes in the high-level policies can be easily traced to the corresponding software development artifacts (e.g., requirements specifications, DB designs, ACPs), where appropriate changes can be made.
Show more

256 Read more

Mapping High Level Application Requirements onto Low Level Cloud Resources

Mapping High Level Application Requirements onto Low Level Cloud Resources

Media distribution requirements, such as high quality high-definition format and capacity of simultaneous us- ers, indicate the hardware constraints (CPU, memory, bandwidth, number of servers) for the media distribution servers. For example, a high-definition video (windows media, 720 p) requires a bit-rate of 2 mbps. In order to serve 500 users simultaneously, at least 30 Windows Media Servers would be required to service this demand (based on the streaming server benchmark [13]). In ad- dition, tight delivery deadline and high quality require- ments may necessitate the use of multi-core, high-CPU or high-memory resources. Multiple country distribution channels indicate the needs of deploying media servers at different locations. These media distribution require- ments are translated onto infrastructure requirements-per- formance, hardware and geographical (see Table 2). Ba- sed on the media requirements, the infrastructure de- ployment specification is formed as follow:
Show more

9 Read more

CoderDojo Community Platform Requirements Specification

CoderDojo Community Platform Requirements Specification

The community platform is intended to help automate the tasks of Champions (such as issuing tickets, managing waiting lists and managing volunteers and attendees), to give recognition to Champions, mentors and attendees through profile pages and awarding of Mozilla Open Badges as well as giving parents and youths a method of booking and viewing tickets for their Dojo. The platform will also help feedback high level statistics and reporting to the CoderDojo Foundation on the CoderDojo Community.

23 Read more

On Agile Performance Requirements Specification and Testing

On Agile Performance Requirements Specification and Testing

Underspecified performance requirements can cause performance issues in a software system. However, a complete, upfront analysis of a software system is difficult, and usually not desirable. We propose an evolutionary model for performance requirements specifications and corresponding validation testing. The principles of the model can be integrated into agile development methods. Using this approach, the performance requirements and test cases can be specified incrementally, without big upfront analysis. We also provide a post hoc examination of a development effort at IBM that had a high focus on performance requirements. The examination indicates that our evolutionary model can be used to specify performance requirements such that the level of detail is commensurate with the nature of the project. Additionally, the IBM experience indicates that test driven development-type validation testing corresponding to the model can be used to determine if performance objectives have been met.
Show more

6 Read more

A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols

A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols

Even assuming “perfect” cryptography, the design of security protocols is notoriously error-prone. Consumer confidence in Internet security and e-commerce infrastructures is eroding in the wake of several highly publicised security failures. Breaches in security can be very costly, particularly when they require the modification of deployed infrastructure. There is therefore a clear case to be made for the integration of formal methods into the engineering processes at standardisation committees for Internet protocols such as IETF, ITU, W3C, Oasis, IEEE, 3GPP, and OMA. The benefits of formal specification and analysis during the software engineering process are well understood: the construc- tion of formal models serves to eliminate many ambiguities in the design process, and such models can then be rigorously analysed against formal specifications of their requirements to identify design flaws.
Show more

13 Read more

ATMOL: A Domain-Specific Language for Atmospheric Modeling

ATMOL: A Domain-Specific Language for Atmospheric Modeling

hold the grid size in the longitudinal, latitudi- nal, and vertical directions, respectively. The vertical grid is at least two points high, which is a useful information for optimal code syn- thesis. This ensures that the lower and upper boundary conditions of the model do not apply simultaneously. Next, two macros are defined for use in field declarations: atmosphere spans

15 Read more

A survey of Software Requirements 
		Specification ambiguity

A survey of Software Requirements Specification ambiguity

The fourth category of (16% [59-66]) solutions are inspections focused. Reviews are conducted during development to refine the SRS to avoid ambiguity. Inspection is used when SRS is supposed to be completed just to detect ambiguities. Effective inspection method can reduce the ambiguity and can improve the quality of Software requirements document. Reading is one of the inspection techniques which can be applied by the reviewer to put more focus on the significant parts of an entity while inspection. Kamsties et al. in [60] proposed a checklist and scenario-based inspection technique. Another type of reading is Usage-based reading focuses on user’s point of view of a software artifact to help reviewer so that they can focus only the important parts [61]. As per Berling & Runeson, (2003) [62], perspective based inspection is more effective than checklist based inspection. Tjong, Hartley, & Daniel, (2008) [59] in their thesis gave some guiding rules on the basis of the corpus which can serve as an Inspection checklist to find ambiguities. In [65] author perspective-based inspection methodology is developed based on Pragmatic Quality Model to recognize 198 total inspection points to prepare a quality inspection report.
Show more

16 Read more

DOCSIS Provisioning of EPON Specifications DPoEv2.0. DPoE MAC and Upper Layer Protocols Interface Specification

DOCSIS Provisioning of EPON Specifications DPoEv2.0. DPoE MAC and Upper Layer Protocols Interface Specification

Under [802.1ad], the term S-VLAN typically refers to a Service (S) VLAN, and the term C-VLAN typically refers to a Customer (C) VLAN. In telecommunications access services implemented with DPoE Networks, for example, the S-VLAN and C-VLAN are used as "outer" and "inner" tags (q-in-q) without respect to their typical meaning in [802.1ad]. [DPoE-MEFv2.0] provides a detailed explanation and requirements for the Metro Ethernet services. There are two Ethernet forwarding models in DPoE Networks for Metro Ethernet services. These are the Provider Bridge (PB) and Provider Backbone Bridge (PBB). In the DPoE Network, classification rules provisioned by an operator are used to make decisions on which frames are dropped or forwarded to specific LLIDs. The selection of the specific forwarding path, operation on the given frame (addition, replacement, or removal of specific fields, as indicated by the provisioned rules) and resulting forwarding path depend on the provisioned classification and modification rules in Section 7.1.4.
Show more

141 Read more

A Systematic Approach to BGP Configuration Checking

A Systematic Approach to BGP Configuration Checking

Property Violations Pattern−Based Constraint Checker Control Flow Analyzer Cisco IOS High−level Network Summary (Web−based interface) Rules Property High−level Specification Control Flow[r]

33 Read more

Recommender Systems for Identifying Elicitation Process (GOREP) in Software Development Life Cycle Model

Recommender Systems for Identifying Elicitation Process (GOREP) in Software Development Life Cycle Model

In goal oriented requirements elicitation process, high level objective of an organization are decomposed and refined using AND/OR graph to get the requirements of software. In this paper, we have identified different methods for goal oriented requirements elicitation process like KAOS, NFR-framework, i*, etc. These methods are developed for some specific purpose. For example, NFR-framework is designed only to elicit and model the non- functional requirements.[6] [2]

8 Read more

Chapter-02slide.ppt

Chapter-02slide.ppt

Testing Requirement Specification System Analysis System Design Testing Implementation Maintenance Deployment. Ensures that the code meets the requirements specification and[r]

79 Read more

A model for the construction of an inter-domain ontology: Corporate Sustainability Index and the G4 Guidelines of the Global Reporting Initiative

A model for the construction of an inter-domain ontology: Corporate Sustainability Index and the G4 Guidelines of the Global Reporting Initiative

 Phase 3: Ontology development process: this stage is the beginning of ontology construction process, comprising the activities described in the following. a) Requirements specification: according to Gruninger and Fox (1995), from the observation of Motivation Scenarios it is possible to draw up a set of competency questions. These questions and their answers allow identifying information in real situations in the domain of the ontology in question. By analyzing the questions that the ontology will have to answer it is possible to determine the domain that the ontology should cover and delimit the ontology scope. It is recommended the documentation of this process for preparing the Scope Document Ontology, which includes information about: its purpose, its usefulness, who can use and maintain the ontology, degree of formality, responsible for the construction, sources of knowledge used, process adopted for the development, quality assurance, used tools, languages used for the representation and formalization, and the products generated.
Show more

7 Read more

Software Requirements Specification for POS_Connect Page 1. Software Requirements Specification. for. POS_Connect. Version 1.0

Software Requirements Specification for POS_Connect Page 1. Software Requirements Specification. for. POS_Connect. Version 1.0

Software   Requirements Specification for POS_Connect Page 24 4.7.2 Functional Requirements REQ­7.1:    A customer can inspect items online add them to a web cart and can purchase the it[r]

30 Read more

Study on Requirement Engineering and Traceability Techniques in Software Artefacts

Study on Requirement Engineering and Traceability Techniques in Software Artefacts

Copyright to IJIRCCE DOI: 10.15680/IJIRCCE.2017. 0501016 117 by project team to understand the problem; it shows how data are processed to output from input given by customer. It also represents data flow from input to output, process, externalentity and data storage. Multiple level of DFD gives information in detail. ER diagram shows how system works by describing the logical structure. Entity is the information required from attributes that contains data. It shows relationships between entities. Use-case diagram shows boundary, external view of the system and how user interacts to the system. Mainly it is used to gather functional requirements. STD shows behavior of the system. It eliminates redundancy. Software Requirements Specification (SRS) describes internal and external behavior of the system that specifies both functional and non- functional requirements written by user or developer [1]. Managing those requirements is essential after requirement engineering which is handled by requirement management phase. Inconsistency occurs between requirements which are handled by traceability links among requirements.
Show more

8 Read more

Software Requirements Management

Software Requirements Management

requirements result in cost and schedule impacts that increase the later they occur (or are discovered) in the software life cycle. Current software technology, processes, and tools provide innovative, automated methods to facilitate optimum management of software requirements. Additionally, a collaborative relationship between the customer, or user, of the software and the developer of the software is essential to the success of the software project. That is, the user/customer requirements must be accurately communicated and understood to be correctly implemented in the software in order to meet end-users needs.
Show more

16 Read more

When Use Cases Aren t Enough

When Use Cases Aren t Enough

Rather than expecting use cases to contain 100 percent of the system’s functionality, I prefer to employ use cases to help the analyst discover the functional requirements. That is, the use cases become a tool rather than being an end unto themselves. Users can review the use cases to validate whether a system that implemented the use cases would meet their needs. The ana- lyst can study each use case and derive the functional requirements the developer must imple- ment to realize the use case in software. I like to store those functional requirements in a traditional SRS, although you could add them to the use case description if you prefer. I’m often asked, “Which comes first: use cases or functional requirements?” The answer is use cases. Use cases represent requirements at a higher level of abstraction than do the detailed functional requirements. I like to focus initially on understanding the user’s goals so that we can see how they might use the product to achieve those goals. From that information, the analyst can derive the necessary functionality that must be implemented so that the users can perform those use cases and achieve their goals.
Show more

11 Read more

University of Surrey (VEC) Requirements Specification

University of Surrey (VEC) Requirements Specification

This document first presents the context in which the vVote System will be used together with a description of the software to aid understanding of the requirements. This context includes detail on the expected architecture of the vVote System which is not strictly specified in an SRS, but is required in order to ensure the correct separation of com- ponents for end-to-end verifiability. These details have been developed from an initial understanding of the Prêt à Voter system. Following this context, formal functional and non-functional requirements of the System are then fully specified, which rely upon this architectural understanding.
Show more

31 Read more

Mobile Maker. Software Requirements Specification

Mobile Maker. Software Requirements Specification

init Add a mobile site and enable it for mobile devices destroy Disable and remove the mobile site. enable Enable the mobile site by adding detection code to the [r]

16 Read more

THE DIGITAL REPOSITORY OF IRELAND: REQUIREMENTS SPECIFICATION

THE DIGITAL REPOSITORY OF IRELAND: REQUIREMENTS SPECIFICATION

This document details the current specified requirements of the DRI, at time of publication. Please note that requirements engineering is an iterative process, hence, throughout the course of development of the Repository some requirements have been replaced, edited, or become obsolete. Therefore, inconsistencies in the numbering of the requirements and/or sub requirements may occur. In addition, the DRI is currently an ongoing project, ergo not all requirements have been fully implemented to date.

21 Read more

Introduction to a Requirements Engineering Framework for Aeronautics

Introduction to a Requirements Engineering Framework for Aeronautics

The concept of requirement is in the middle of systems engineering, as the abundant literature on the subject attests it [12-15]. We define a ‘requirement’ as a cus- tomer’s elementary need that is to be implemented in the product or service that he receives 1 . In systems engineer- ing, we can refine this rough definition by distinguishing the characteristics of the system to be built, known as the functional requirements, from the ways the system achieves its functions, known as the non-functional re- quirements (e.g. performance, quality, interface require- ments, etc.). We can also differentiate the customer’s needs, from which the supplier’s distributed requirements are issued, among three hierarchical levels, which are the system, the high-level and the low-level requirements sets. From now on, by “customer”, we mean not only the purchaser of the building system, but also the supplier’s teams who require services from other ones along an enterprise workflow dedicated to requirements manage- ment. Thus, we distinguish four main requirement levels according to their refinement level, plus a requirement implementation level as shown in Figure 1:
Show more

7 Read more

Show all 10000 documents...