非功能需求交互的语义建模和自动化推理
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
非功能需求是说明软件系统或组件必须要达到的质量、运行能力等方面的需求,是软件开发过程中需要关注的关键要素。由于具有主观性、相对性、多样性和交互性等特性,非功能需求的研究已成为需求工程业界关注的热点。本课题源于国家863项目和重庆市自然基金项目,重点研究非功能需求之间的交互问题,该问题也可表述为非功能属性之间的相容和失配。
     在方法论层面,非功能需求框架中的柔目标依存图是专门用于处理非功能需求交互的结构化、图形化建模语言,可对非功能需求的复杂关系进行可视化建模和过程化支持,为设计决策提供支持。但它在形式化、自动化方面的能力有限,实例数据模型不具有语法和语义互操作性,难以用于机器理解和自动化推理。
     在问题域方面,非功能需求交互问题是系统复杂性和涌现性的体现。须在全局范围内来考察非功能需求,了解它们之间产生的相容和失配关系和机理,进而检测出失配关系,为需求权衡和设计决策提供依据。非功能需求的实现将会横切多个基本功能组件,使得非功能需求和功能需求之间产生复杂的依赖关系。功能需求之间产生的交互也会为非功能需求的可满足性和关联带来错综复杂的影响。分析非功能需求的交互和作用机理,还需要结合对功能需求交互的机理分析来展开。
     本文通过本体论和语义万维网技术扩展非功能需求框架和柔目标依存图在非功能需求建模和分析方面的能力,探寻本体模型中的公理化和规则化相协同的语义建模方法;实现非功能需求知识表示、语义互操作、实例模型的共享与重用。采用本体化的方法对非功能需求交互关系、相容失配的机理进行建模和规约,通过规则的推理实现非功能需求的自动化分析和验证。主要研究内容和创新性成果包括以下五个方面:
     ①研究非功能需求交互的形式化本体建模方法,构建出使用语义万维网本体语言(OWL)描述的非功能需求形式化本体。主要工作包括:以非功能需求框架和柔目标依存图为需求建模的参考模型进行形式化建模,论述了用于非功能需求交互的概念层次模型、属性关系、依存关系建模模式、本体公理化等本体建模的技术和方法,构建出非功能需求的核心本体模型。为非功能需求概念建模和语义表示提供完整的方法论支持,奠定了形式化规约的基础。
     ②研究柔目标依存图的语义表示方法、结构化语法特性和语义互操作性,提出了语法一致性检验规则和度量指标。主要工作是论述了基于知识管理的非功能需求语义表示框架;提出柔目标依存图符合严格无回路有向图的约束条件,依次对柔目标依存图中非功能需求的分解、关联等依存关系的结构化特性进行分析,建立了语法一致性检验规则;对实例模型的度量指标进行了分析,并定义了判定规则;通过实验研究验证了语义规则的正确性。
     ③研究柔目标依存图中因非功能需求之间的依存关系而产生相容、失配的交互机理,提出形式化和规则化的表示方法。主要工作是对非功能需求可满足性评估过程进行分析,对评估准则进行语义建模;进而提出基于领域知识的隐式关联规则表示方法、基于波动影响评估的间接语义路径关联规则和失配模式,实现了形式化表示方法和自动化检测规则,可用于分析和检测柔目标依存图实例数据模型中潜在的失配关系,并通过实验案例研究验证了语义规则的正确性和方法的有效性。
     ④研究功能需求与非功能需求的依存关系和形式化语义表示方法,提出用于分析功能需求的交互所引发非功能需求隐式关联和失配关系的分析方法。主要工作包括:基于特征-柔目标依存图的语法,建立了功能需求和非功能需求依存关系表示的语义表示模型;对功能需求交互的模式和机理进行了形式化的分析;提出了基于语义万维网技术的功能需求交互的自动化检测方法,分析并定义了由功能需求交互引发的非功能需求交互的隐式关联规则;最后通过案例研究验证了规则的正确性和方法的有效性。
     ⑤研究非功能需求知识知识管理方法,将模式化、关注点分离、可扩展性、可重用等特性,融入到上述研究过程中,为方法论和技术体系在解决非功能需求分析建模问题的多样性、有效性、实用性等方面提供充分的理据。
Non-Functional Requirements (NFRs) address important issues such as qualityproperties and performance for software systems, products or services. NFRs are vitalto the success of software system. Duo to the distinct nature from FunctionalRequirements (FRs), as subjectivity, relativity, diversity and interactivity, NFRsproblems are challengeable and currently acting as one of the hottest spot issues inrequirements engineering society. The works of this thesis are derived from projectsgranted by the National High Tech Program (863Program) and Nature ScienceFoundation of Chongqing. The thesis focuses on interaction problems of NFRs, a.k.a,harmony and conflict relationships among nonfunctional attributes of software system.
     As a methodology, Softgoal Interdependency Graph (SIG) from the well knownNon-Functional Requirement Framework is a graphical and structural modelinglanguage which is specialized to deal with NFRs interdependencies and interactions.SIG is an operative tool to model and visualize complex correlations among NFRs bypresenting a process-oriented support for NFRs refinement, trade-off and deign decision.Nevertheless, the disadvantages of SIG lie in the limitation of formalize and automation,lacing of syntactic and semantic interoperability for instance data models, as well asdifficulties of carrying out machine readability and automated reasoning.
     For the nature of NFRs problems, it is the reflection of system complexity andemergency. It is better to investigate NFRs with a systematic view to know the truth ofmechanism for harmony and conflict, to detect conflict as early as possible. Carryingout this task can help the developer to make decision with abundant facts for rationale.On the other hand, NFRs will be developed and implement as cross-cutting concernsamong multiple components, results in complex dependencies between NFRs and FRs.Consequently, it is essence to address the implicit correlations of NFRs which arecaucused by FRs interaction.
     The thesis aims to extent the capability of NFR Framework and SIG for modelingand analyzing NFRs, with the aid of Ontology and Semantic Web technologies. Thework also explores approaches to modeling NFRs in semantic level with the synergy ofontological axioms and semantic rules, to facilitate knowledge representation, semanticinteroperability, sharing and reusing of instance data models of NFRs. Furthermore, thethesis proposes formalized and ontological methods for modeling and representing NFRs interaction, as well as mechanism of harmony and conflicts. Thus leads us to a setof well defined semantic rules for automated reasoning with NFRs interaction. Thethesis contributes NFRs modeling and reasoning with five aspects, as follows.
     Firstly, the author proposes a formal and ontological approach to model NFRsinteraction, develops an NFRs core ontology represented with Web Ontology Language(OWL). The work starts with formalizing NFR framework and SIG which are acting asreference models for representing NFRs interaction. An Ontology Engineering processis performed then, in detailed means of concept hierarchy, attitudes derivation, patternsof modeling relations between/among NFRs, and axiomatization as well. AnOWL-based core ontology is developed to support conceptual modeling and knowledgerepresentation for NFRs.
     Secondly, the thesis investigates methods to represent an instance model of SIG,with analyzing its structural properties and syntactic interoperability, and exploresmeans of syntactic consistency checking as well as instance model metrics. The workbegins with an ontological analysis for knowledge-based framework of SIG to representNFRs interaction. By showing the axioms and restrictions of SIG as a strictlycircuit-less directed graph, the author discusses structural properties of softgoaldecomposition and correlation as interdependencies. Moreover, a set of structuralcharacteristics derived from Graph Theory is selected as metric factors for instancemodels. A group of semantic rules are defined then for automated reasoning, andvalidated by testing them with seven instance SIG models from literature.
     Thirdly, the thesis investigates and formalizes the mechanisms of NFRsinteractions as harmony and conflicts in SIG models, which are caused byinterdependencies of softgoals in the graph. The work begins with analysis of NFRssatisficing evaluation process, with semantic modeling for evaluation criteria. Therewith,the thesis proposes approach to correlation rules for implicit softgoal interdependencieswith domain knowledge, as well as rules for indirectly semantic correlation byextending so called delta evaluating method. A group of reasonable rules in SemanticWeb environment is defined as well, to facilitate analysis and detection of conflictsbetween/among NFRs in SIG instance models. An experimental study is performed then,to validate correctness of rules, and feasibility proposed methods.
     Fourthly, the thesis takes FRs into account, by extending currently method torepresent dependencies of NFRs and FRs in an incorporative model. We propose meanswith a set of correlation rules to detect NFRs conflict which are derived from FRs interaction. The start point of the work is to represent interdependencies of FRs andNFRs with a modeling language named F-SIG. Thus the author investigates andformalizes mechanisms of FRs interaction, proposes an ontological approach to detectFRs interaction with semantic rules. The rules for implicit correlations of NFRs causedby FRs interaction are presented then to detect potential conflicts of NFRs. A case studyon smart home system is performed, to validate the feasibility proposed methods
     Finally, we put a knowledge based method for NFRs interaction into above works,with regarding to its properties as modularity, cross-cutting concerns, extendibility andreusability. The scattered works can also act as supplementary contributions for thethesis, to make the above works more feasible in real practice on NFRs problems.
引文
郭树行,兰雨晴, and金茂忠,(2007).基于目标的软件可信性需求规约方法研究[J].计算机工程,33(11)37-38,41.
    金芝,刘璘, and金英.(2008).软件需求工程:原理和方法[M].北京:科学出版社:4-5.
    李玉琴.(2007)需求工程与软件产品线若干关键技术研究[D].复旦大学博士论文:37-41.
    刘春,王越, and金芝.(2010).基于知识的软件可信性需求获取[J].电子学报,38(2):188-193,2010.
    刘克,单志广,王戟,何积丰,张兆田, and秦玉文.(2008).可信软件基础研究”重大研究计划综述[J].中国科学基金,2008(3):145-151.
    陆汝钤,金芝, and陈刚.(2000).面向本体的需求分析[J].软件学报,11(8):1009-1017.
    罗新星,朱名勋, and陈晓红,(2010).可信软件中非功能需求FO-QSIG冲突权衡模型[J].系统工程,28(2):101-104.
    梅宏,黄罡,邢岩,彭枫.(2002)特征交互问题导论[J].电子学报,30(12A):1923-1927.
    张晓林.(2002). Semantic Web与基于语义的网络信息检索[J].情报学报,21(4):413-417.
    张岩, and梅宏.(2009). UML类图中面向非功能属性的描述和检验[J].软件学报,20(6):1457-1469.
    Al Balushi TH, Sampaio P, Dabhi D, and Loucopoulos P.(2007) ElicitO: A quality ontology-guidedNFR elicitation tool [C].13th International Working Conference on RequirementsEngineering: Foundation for Software Quality (REFSQ2007):306-319.
    Alexander I.(2003). Misuse cases help to elicit non-functional requirements [J]. Computing&Control Engineering Journal,14(1):40-45.
    Amyot D., and Mussbacher G.(2003). URN: Towards a new standard for the visual description ofrequirements [M]. In: Sherratt, E.(ed.) SAM2002. LNCS, vol.2599:21-37.
    Arpírez J., Corcho O., Fernández-López M., and Gómez-Pérez A.(2001). WebODE: a scalableworkbench for ontological engineering [C]. Proceedings of the First InternationalConference on Knowledge Capture, ACM New York, NY, USA:6-13.
    Atkins D, Stallings W, and Zimmermann P.(1996) PGP message exchange formats [EB/OL]. IETFRFC1991,1996. Available from: http://www.ietf.org/rfc/rfc1991.txt
    Baader F., Calvanese D., McGuinness D., Nardi D., and Patel-Schneider P.(2003). The descriptionlogic handbook: theory, implementation, applications [M]. Cambridge University Press,Cambridge, UK.
    Baader F., Horrocks I., and Sattler U.(2007) Description Logics (book chapter). In van Harmelen F.,Lifschitz V., and Porter B., eds, Handbook of Knowledge Representation[M]. Elsevier,Amsterdam, The Netherlands.
    Barbacci M, Klein MH, Longstaff TA, and Weinstock CB.(1995). Quality attributes [R]. TechnicalReport CMU/SEI-95-TR-021, ESC-TR-95-021, Software Engineering Institute,Carnegie Mellon University.
    Becker S. et al.(2006). Trustworthy software systems:a discussion of basic concepts andterminology [J]. ACM SIGSOFT Software Engineering Notes,31(6):1-18.
    Becker S., Winteler D., Giesecke S., Meyer R. et al.(2006). Trustworthy software systems: adiscussion of basic concepts and terminology [J]. SIGSOFT Software Engineering Notes,31(6):1-18.
    Benjamin P., Menzel C., Mayer R., Fillion F., Futrell M., de Witte P., et al.(1994) IDEF5methodreport [TR]. Knowledge Based Systems, Inc., http://www.idef.com/pdf/Idef5.pdf, Texas,USA.
    Boehm B.(1978). Characteristics of software quality [M]. New York, NY, USA: North-Holland Pub.Co.1978.
    Boehm B.(1988). A spiral model for software development and enhancement [J]. Computer,20(9):61-72.
    Boehm B., and In H.(1996). Identifying quality-requirement conflicts [J]. IEEE Software,13(2):25-35.
    Boehm B., Bose P., Horowitz E., and Lee M.(1995). Requirements negotiation and renegotiationaids: a theory-w based spiral approach [C]. In Proceedings of the17thInternationalConference on Software Engineering (ICSE’95), ACM, NY, USA:243-254.
    Bolognesi T., and Brinksma E.(1987). Introduction to the ISO specification language LOTOS [J].Computer Networks and ISDN systems,14(1):25-59.
    Bonino D, and Corno F.(2010) Rule-based intelligence for domotic environments [J]. Automation inConstruction,19(2):183-196.
    Booch G., Jacobson I., and Rumbaugh J.(2000). OMG unified modeling language specification,version1.3[S]. Object Management Group Standard, http://www.omg.org/spec/UML/.
    Borst W.(1997). Construction of engineering ontologies for knowledge sharing and reuse [D]. PhDthesis, University of Twente, the Netherlands.
    Bowen TF, Dworack FS, Chow CH, Griffeth N, Herman GE, and Lin Y-J.(1989) The featureinteraction problem in telecommunications systems [C]. In Proceedings of the7thInternational Conference on Software Engineering for Telecommunication SwitchingSystems(SETSS89):59-62.
    Brickley D., and Guha R.(2004). RDF vocabulary description language1.0: RDF Schema [EB/OL].W3C Recommendation, http://www.w3.org/TR/rdf-schema/.
    Brooks F. P.(1987). No silver bullet: Essence and accidents of software engineering [J]. IEEEcomputer,20(4):10-19.
    Buhr R., and Casselman R.(1996). Use case maps for object-oriented systems [M]. Prentice-Hall.
    Calder M, Kolberg M, Magill EH, and Reiff-Marganiec S.(2003) Feature interaction: a criticalreview and considered forecast [J]. Computer Networks,41(1):115-141.
    Chan M, Esteve D, Escriba C, and Campo E.(2008) A review of smart homes-present state andfuture challenges [J]. Computer Methods and Programs in Biomedicine,91(1):55-81.
    Chen P.(1976). The entity-relationship model: toward a unified view of data [J]. ACM Transactionson Database Systems,1(1):9-36.
    Chung L., and Supakkul S.(2006). Representing NFRs and FRs: A goal-oriented and use case drivenapproach [M]. In Dosch et al (eds.) SERA2004. LNCS,3647:29–41.
    Chung L., Nixon B., Yu E., et al.(1999). Non-functional requirements in software engineering [M].Boston: Kluwer Academic Publishers.
    Classen A, Heymans P, and Schobbens P-Y.(2008) What’s in a feature: a requirements engineeringperspective [C]. In Proceedings of the11thInternational Conference on FundamentalApproaches to Software Engineering. Budapest, Hungary: Springer:16-30.
    Clarke E., Grumberg O., and Peled D.(1999) Model Checking [M], MIT Press.
    Cleland-Huang J, Settimi R, BenKhadra O, Berezhanskaya E, and Christina S.(2005) Goal-centrictraceability for managing non-functional requirements [C]. Proceedings of27thInternational Conference on Software Engineering (ICSE2005):362–371.
    Cleland-Huang J., Marrero W., and Berenbach B.(2008) Goal-centric traceability: using virtualplumblines to maintain critical systemic qualities [J]. IEEE Transactions on SoftwareEngineering,34(5):685-699.
    Cranefield S., and Purvis M.(1999). UML as an ontology modelling language [C]. In Proceedings ofWorkshop on Intelligent Information Integration, with16th International Joint Conferenceon Artificial Intelligence (IJCAI-99):46-53.
    Crespo RG.(2010) Predicting feature interactions by using inconsistency models [J]. ComputerNetworks,54(3):416-427.
    Cysneiros L, Yu E, and Leite J.(2003) Cataloguing non-functional requirements as softgoalsnetworks [C]. Proceedings of the Workshop on Requirements Engineering for AdaptableArchitectures at the11thIEEE International Requirements Engineering Conference,California, USA:13-20.
    Cysneiros L., and Leit J.(2001). Using UML to reflect non-functional requirements [C]. InProceedings of the2001Conference of the Centre For Advanced Studies on CollaborativeResearch:1-15.
    Dardenne A., van Lamsweerde A., and Fickas S.(1993). Goal-directed requirements acquisition [J]Science of Computer Programming,20(1):3-50.
    DARRPA.(2000). The DARRPA agent markup language [EB/OL]. http://www.daml.org/.
    Dobson G, and Sommerville I.(2006) Disambiguating availability specification through the use ofOWL [C]. In: Service-Oriented Computing: Consequences for Engineering Requirements,SOCCER’06:5-12.
    Dobson G, Hall S, and Kotonya G.(2007). A domain-independent ontology for non-functionalrequirements. In Porceedings of IEEE2007International Conference on e-BusinessEngineering:563-566.
    ElGamal T.(1985) A Public-Key Cryptosystem and a Signature Scheme Based on DiscreteLogarithms [J]. IEEE Transactions on Information Theory,31(4):469-472.
    Fensel D., Van Harmelen F., Horrocks I., McGuinness D., and Patel-Schneider P.(2001) OIL: Anontology infrastructure for the semantic web [J]. IEEE Intelligent Systems,16(2):38-45.
    Fernández M., Gómez-Pérez A., and Juristo N.(1997). Methontology: from ontological art towardsontological engineering [C]. In: Proceedings of the AAAI97Spring Symposium Series onOntological Engineering:33-40.
    Finkelstein A., and Dowell J.(1996). A comedy of errors: the London ambulance service case study[C]. In Proceedings of the8th International Workshop on Software Specification andDesign:2-4.
    Fu Q., Harnois P., Logrippo L., and Sincennes J.(2000) Feature interaction detection: aLOTOS-based approach [J]. Computer Networks,32(4):433-448.
    Ga vi D., Kaviani N., and Milanovi M.(2009). Ontologies and software engineering. In Staab&Studer ed, Handbook on Ontologies (2ndedition)[M]. Springer, Berlin:593-615.
    Genesereth M., and Fikes R.(1992). Knowledge interchange format, version3.0, reference manual[R]. Technical report, Logic-92-1, Computer Science Dept., Stanford University.
    Giorgini P., Mouratidis H., and Zannone N.(2006). Modelling security and trust with secureTropos[M], in Mouratidis H. and Giorgini P. ed., Integrating Security and SoftwareEngineering: Advances and Future Visions. Idea Group Publishing:70-105.
    Glinz M.(2007). On non-functional requirements [C]. In Proceedings of the15thIEEE InternationalConference on Requirements Engineering:21-26.
    Gomez-Perez A., and Benjamins R.(1999). Overview of knowledge sharing and reuse components:ontologies and problem-solving methods [C]. In Proceeding of the IJCAI-99workshop onOntologies and Problem-Solving Methods (KRR5), Stockholm, Sweden:1-15.
    Grau B., Horrocks I, Motik B, Parsia B, Patel-Schneider P, and Sattler U.(2008). OWL2: the nextstep for OWL [J]. Journal of Web Semantics,6(4):309-322.
    Gruber T.(1993). A translation approach to portable Ontology specifications [J]. KnowledgeAcquisition,5(2):199-220.
    Gruber T.(1995). Toward principles for the design of ontologies used for knowledge sharing [J].International Journal of Human-Computer Studies,43:907-928.
    Gruninger M., and Fox M.(1995). Methodology for the design and evaluation of ontologies [C]. Inproceedings of the Workshop on Basic Ontological Issues in Knowledge Sharing, held inconjunction with IJCAI-95, Montreal, Canada.
    Guarino N.(1998). Some ontological principles for designing upper level lexical resources [C]. InProceedings of the First International Conference on Language Resources and Evaluation,Granada, Spain:527-534.
    Gunter C., Gunter E., Jackson M., and Zave P.(2000). A reference model for requirements andspecifications [J]. IEEE Software,17(3):37-43
    Haley C., Laney R., Moffett J., and Nuseibeh B.(2008). Security requirements engineering: Aframework for representation and analysis [J], IEEE Transactions on SoftwareEngineering,34(1):133-153.
    Hall R.J.(2005) Fundamental nonmodularity in electronic mail [J]. Automated SoftwareEngineering,12(1):41–79.
    Harel D.(1987) Statecharts: A visual formalism for complex systems [J]. Science of ComputerProgramming,8(3):231-274.
    Herrmann A., and Paech B.(2008). MOQARE: misuse-oriented quality requirements engineering [J].Requirements Engineering,13(1):73–86.
    Horridge M. et al.(2007). A practical guide to building owl ontologies using protégé4and CO-ODEtools editiion1.1[EB/OL]. University Of Manchester, http://www.co-ode.org/resources/tutorials/ProtegeOWLTutorial-p4.0.pdf.
    Horrocks I, Patel-Schneider P F, Boley H, et al.(2004) SWRL: a semantic web rule languagecombining OWL and RuleML [EB/OL]. http://www.w3c.org/Submission/2004/SUBM-SWRL-20040521/.
    Horrocks I., Patel-Schneider P.F., and van Harmelen F.:(2003) From SHIQ and RDF to OWL: TheMaking of a Web Ontology Language [J]. Journal of Web Semantics,1(1):7-26.
    Huang C., Sun J., Wang X., and Si Y.(2009). Role engineering with SKAOS for systems employingRBAC [C], in Proceedings of2009International Conference on Networking and DigitalSociety, IEEE CS, Washington, DC, USA,2:56-60.
    Huang G, Liu Xuanzhe, and Mei H.(2008) An online approach to feature interaction problems inmiddleware based systems [J]. Science in China, series F,51(3):225-239.
    IEEE.(1990). IEEE610.12-1990: IEEE standard glossary of software engineering terminology [S].The Institute of Electrical and Electronics Engineers, New York, NY, USA.
    IEEE.(1998). IEEE Std830-Recommended Practice for Software Requirements Specifications[S].The Institute of Electrical and Electronics Engineers, New York, NY, USA.
    ISO/IEC.(2001). ISO/IEC9126-1: Information Technology-Software Product Quality, Part1:Quality Model [S]. International Standards Organization&International ElectrotechnicalCommission, Switzerland.
    ISO/IEC.(2005). ISO/IEC15408:2005Information technology–Security techniques–Evaluationcriteria for IT security,(Common Criteria v3.0)[S]. International Standards Organization&International Electrotechnical Commission, Switzerland.
    ITU.(2008). ITU Recommendation Standards-Z.151: User requirements notation (URN)-Languagedefinition [S]. ITU, http://www.itu.int/itudoc/itu-t/aap/sg17aap/history/z150/z150.html.
    Jackson D.(2005). Dependable software: an oxymoron?[C]. In Proceedingsof the13thIEEEInternational Conference on Requirements Engineering:3.
    Jackson M.(1995). Software requirements and specifications: a lexicon of practice, principles andprejudices [M]. Harlow: Addison-Wesley.
    Jackson M.A.(2000). Problem Frames: Analyzing and structuring software development problems[M]. Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA.
    Jacobson I., Booch G., and Rumbaugh J.(1999). The unified software development process [M].Addison-Wesley, Reading, UK.
    Jaramillo C., Gelbukh A., and F. Isaza.(2006). Pre-conceptual schema: A conceptual-graph-likeknowledge representation for requirements elicitation [M], Advances in ArtificialIntelligence, LNAI4293:27-37.
    Jarzabek S, Yang B, and Yoeun S.(2006) Addressing quality attributes in domain analysis forproduct lines [J]. IEE Proceedings Software,153(2):61-73.
    Josefsson S.(2006) The Base16, Base32, and Base64Data Encodings [EB/OL]. IETF RFC4648,Available from: http://www.ietf.org/rfc/rfc4648.txt
    Jürjens J.(2002). UMLsec: extending UML for secure systems development [C]. Proceedings of the5thInternational Conference on the Unified Modeling Language, LNCS, Springer2460:412-425
    Kaiya H., and Saeki M.(2006). Using domain ontology as domain knowledge for requirementselicitation [C]. In Prceedings of the14thInternational Conference on RequirementsEngineering:189-198.
    Kang K., Lee J., and Donohoe P.(2002). Feature-oriented product line engineering [J]. IEEESoftware,19(9):58-65.
    Kassab M, Ormandjieva O, Daneva M.(2009). An Ontology Based Approach to Non-functionalRequirements Conceptualization [C]. In Proceddings of the4th International Conferenceon Software Engineering Advances:299-308.
    Kayed A, Hirzalla N, Samhan AA, and Alfayoumi M.(2009). Towards an Ontology for SoftwareProduct Quality Attributes [C]. In Proceedings of the4thInternational Conference onInternet and Web Applications and Services:200-204.
    Kietz J., Maedche A., and Volz R.(2000). A method for semi-automatic ontology acquisition from acorporate intranet [C]. In EKAW’00Workshop on Ontologies and Text.
    Klensin J.(2001) Simple Mail Transfer Protocol [EB/OL]. IETF RFC2821, Available from:http://www.ietf.org/rfc/rfc2821.txt
    Koay N, Kataria P, Juric R, Oberndorf P, and Terstyanszky G.(2009). Ontological support formanaging non-functional requirements in pervasive healthcare [C] In Proceedings of the42ndHawaii International Conference on System Sciences:1-10.
    Lai X., and Massey J.(1990) A proposal for a new block encryption standard [C]. Proceedings ofEuropean Workshop on the Theory and Application of Cryptographic Techniques(EUROCRYPT1990), LNCS473:389-404.
    Landwehr C. E., Bull A. R., McDermott J. P., and Choi W. S.(1994). A taxonomy of computerprogram security flaws [J], ACM Computing Surveys,26(3):211-254.
    Laney R, Tun TT, Jackson M, Nuseibeh B.(2007) Composing features by managing inconsistentrequirements [C]. In Feature Interactions in Software and Communication Systems IX.Grenoble, France: IOS Press:129-144.
    Laprie J., Avi ienis A, and Kopetz H.(1992). Dependability: basic concepts and terminology [M].Springer-Verlag New York, Inc.1992.
    Leite J., Hadad G., Doorn J., and Kaplan G.(2000). A scenario construction process [J].Requirements Engineering,5(1):38-61.
    Lenat D., and Guha R.(1990). Building large knowledge-based systems: representation andinference in the Cyc project [M]. Addison-Wesley, Reading, Massachusetts.
    Lin L., Nuseibeh B., Ince D., and Jackson M.(2004)“Using abuse frames to bound the scope ofsecurity problems [C] Proceedings of the12th IEEE International Conference onRequirements Engineering. IEEE CS, Washington, DC, USA:354-355.
    Liu C-L.(2010). Ontology-based conflict analysis method in non-functional requirements [C]. In:9th IEEE/ACIS International Conference on Computer and Information Science, ICIS2010:491-496.
    Liu L., Yu E., and Mylopoulos J.(2003). Security and privacy requirements analysis within a socialsetting [C]. Proceedings of the11thIEEE international Conference on RequirementsEngineering, IEEE CS, Washington, DC, USA:151-161.
    Liu Y, and Meier R.(2008) Feature Interaction in Pervasive Computing Systems [C]. Proceedings ofthe1stInternational Workshop on Context-aware Adaptation Mechanisms for Pervasiveand Ubiquitous Services (CAMPUS2008), Electronic Communications of the EASST,11:1-7.
    Lodderstedt T., Basin D., and Doser J.(2002). SecureUML: a UML-based modeling language formodel-driven security[C]. In Proceedings of the5th International Conference on theUnified Modeling Language, LNCS, Springer,2460:426-441.
    Loveland, D.(1978). Automated Theorem Proving: A Logical Basis [M]. Fundamental Studies inComputer Science Volume6. North-Holland Publishing.
    López C, Cysneiros LM, and Astudillo H.(2010). NDR Ontology: Sharing and Reusing NFR andDesign Rationale Knowledge. In First International Workshop on ManagingRequirements Knowledge:1-10.
    MacGregor R.(1991). Inside the LOOM classifier [J]. SIGART Bulletin,2(3):70-76.
    Mairiza D., Zowghi D., and Nurmuliani N.(2010). An investigation into the notion ofnon-functional requirements[C]. In: Proceedings of the2010ACM Symposium onApplied Computing. New York, NY, USA: ACM:311-317.
    Mannering D., Hall J., and Rapanotti L.(2007). Towards normal design for safety-critical systems[M]. Fundamental Approaches to Software Engineering, LNCS, vol4422:398-411.
    Manola F., and Miller E.(2004). RDF Primer [EB/OL].W3C Recommendation, http://www.w3.org/TR/rdf-syntax/.
    Marew T, Lee J-S, and Bae D-H.(2009) Tactics based approach for integrating non-functionalrequirements in object-oriented analysis and design [J]. Journal of Systems and Software,82(10):1642-1656.
    McCall J, Richards P., and Walters G.(1977). Factors in software quality, volume I: concepts anddefinitions of software quality [R]. Technical Report, No. CDRL-A003, NationalTechnical Information Service, USA.
    McDermott J., and Fox C.(1999). Using Abuse Case Models for Security Requirements Analysis[C]. Proceedings of the15thAnnual Computer Security Applications Conference, ACM,Washington, DC, USA:55-66.
    McGuinness D., and van Harmelen F.(2004). OWL web ontology language overview [EB/OL].W3C Recommendation, http://www.w3.org/TR/owl-features/.
    Mei H, Zhang W, and Zhao H.(2006) A metamodel for modeling system features and theirrefinement, constraint and interaction relationships [J]. Software&System Modeling,5(2):172-186.
    Merkle R., Hellman M.(1981) On the Security of Multiple Encryption [J]. Communications of theACM,24(7):465-467.
    Metzger A, and Webel C.(2003) Feature interaction detection in building control systems by meansof A formal product model [C]. In Amyot D., and Logrippo L.(Eds.), Feature Interactionsin Telecommunications and Software Systems VII, Ottawa, Canada: IOS Press:105-121.
    Miller G.(1990). WordNet: an online lexical database [J]. International Journal of Lexicography,3(4):235-312.
    Mizoguchi R., Vanwelkenhuysen J., and Ikeda M.(1995). Task ontology for reuse of problemsolving knowledge [M]. In Mars N. eds, Towards Very Large Knowledge Bases:Knowledge Building&Knowledge Sharing., IOS Press, Amsterdam, Netherlands:46-57.
    Myers J, Rose M.(1996) Post Office Protocol-Version3[EB/OL]. IETF RFC1939, Available from:http://www.ietf.org/rfc/rfc1939.txt
    Mylopoulos J., Castro J., and Kolp M.(2000). Tropos: A framework for requirements-drivensoftware development [M]. Information Systems Engineering: State of the Art andResearch Themes, Springer-Verlag:261-273.
    Mylopoulos J., Chung L., and Nixon B.(1992). Representing and using nonfunctional requirements:A process-oriented approach [J]. IEEE Transactions on Software Engineering,18(6):483-497.
    Nakamura M, Igaki H, and Matsumoto K.(2005) Feature interactions in integrated services ofnetworked home appliances-an object-oriented approach [C]. Feature Interactions inTelecommunications and Software Systems VIII. Leicester, UK: IOS Press:236-251.
    Nakamura M, Leelaprute P, Matsumoto K-I, and Kikuno T.(2004) On detecting feature interactionsin the programmable service environment of Internet telephony [J]. Computer Networks,45(5):605-624.
    Nhlabatsi A., Laney R., and Nuseibeh B.(2008). Feature interaction: The security threat from withinsoftware systems [J]. Progress in Informatics,5:75-90.
    NIST-U.S.(1994) Digital Signature Standard (DSS)[S]. Federal Information Processing StandardsPublication (FIPS PUB186), National Institute of Standards and Technology, U.S.
    NIST-U.S.(2001) Advanced Encryption Standard (AES)[S]. Federal Information ProcessingStandards Publication (FIPS PUB197), National Institute of Standards and Technology,U.S.
    NIST-U.S.(2002) Secure Hash Standard [S]. Federal Information Processing Standards Publication(FIPS PUB180-2), National Institute of Standards and Technology, U.S.
    Nixon B.A.(2000) Management of performance requirements for information systems [J]. IEEETransactions on Software Engineering,26(12):1122-1146.
    Norries M.(1990). Z: A formal specification method and brief report. In Thayer and Dorfman ed.,Tutorial: System and Software Requirements Engineering [M]. IEEE CS:345-369.
    Noy N., and McGuinness D.(2001) Ontology Development101: A guide to creating your firstOntology [TR]. Technical Report No. KSL-01-05, Knowledge Systems Laboratory,Stanford University, http://www.ksl.stanford.edu/KSL_Abstracts/KSL-01-05.html.
    Noy N., and Rector A.(2006). Defining n-ary relations on the semantic web [EB/OL]. W3CWorking Group Note, http://www.w3.org/TR/swbp-n-aryRelations/.
    Obrst L.(2003). Ontologies for semantically interoperable systems [C]. In Proceedings of the12thInternational Conference on Information and Knowledge Management, New Orleans, LA,USA, CIKM'03:366-369.
    O'Connor M. J., and Das A. K.(2009) SQWRL: a Query Language for OWL [C].,6th InternationalWorkshop, Chantilly on OWL Experiences and Directions (OWLED).
    Oladimeji E, Supakkul S, and Chung L.(2006) Security threat modeling and analysis: agoal-oriented approach [C]. Proceedings of the10th IASTED International Conference onSoftware Engineering and Applications(SEA2006), November13-15,2006, Dallas, TX,USA.
    Parviainen P, and Tihinen M.(2007). A survey of existing requirements engineering technologiesand their coverage [J]. International Journal of Software Engineering and KnowledgeEngineering,17(6):827-850.
    Paul R, I-Ling Yen, Bastani F, Dong J, Wei-Tek Tsai, Kavi K, et al.(2008). An ontology-basedintegrated assessment framework for high-assurance systems [C]. In Proceedings of IEEEInternational Conference on Semantic Computing:386-393.
    Peng X., Lee S., and Zhao W.(2009). Feature-oriented nonfunctional requirement analysis forsoftware product line [J]. Journal of Computer Science and Technology,24(2):319-338.
    Pohl K, B ckle G, and van der Linden F.(2005) Software product line engineering: foundations,principles, and techniques [M]. Springer-Verlag Berlin Heidelberg:6-8.
    Poort E.R, and de With P.H.N.(2004) Resolving requirement conflicts through non-functionaldecomposition [C]. Proceedings of IEEE/IFIP4thWorking Conference on SoftwareArchitecture:145-154.
    Qureshi NA, and Perini A.(2009). Engineering adaptive requirements [C]. In2009ICSE Workshopon Software Engineering for Adaptive and Self-Managing Systems, IEEE CS:126-131.
    Ramsdell B. Secure/Multipurpose (2004) Internet Mail Extensions (S/MIME) Version3.1messagespecification [EB/OL].IETF RFC3851, available from: http://www.ietf.org/rfc/rfc3851.txt
    Reiff-Marganiec S., and Turner K.J.(2004) Feature interaction in policies [J]. Computer Networks,45(4):569–84.
    Reiter R.(1977) On closed world data bases [R]. Technical Report, University of British Columbia;Vancouver, BC, Canada.
    Rivest R.L.(1992) The MD5Message-Digest Algorithm [EB/OL]. IETF RFC1321. Available from:http://www.ietf.org/rfc/rfc1321.txt
    Rivest R.L., Shamir A., and Adleman L.M.(1978) A Method for Obtaining Digital Signatures andPublic-Key Cryptosystems [J]. Communication of the ACM,21(2):120-126.
    Robertson S., and Robertson J.(1999). The volere requirements process, mastering the requirementsprocess [M]. Addison-Wesley, London.
    Robinson WN, Pawlowski SD, and Volkov V.(2003) Requirements interaction management [J].ACM Computing Surveys,35(2):132-190.
    Rosa N., Justo G., and Cunha P. A framework for building non-functional software architectures [C].In Proceedings of the2001ACM symposium on Applied Computing. ACM, NewYork:141-147.
    Ross D.(1977). Structured analysis (SA): a language for communicating ideas [J]. IEEE Transactionon Software Engineering,3(1):16-34.
    Royce W.(1970). Managing the development of large software systems [J]. Proceedings of IEEEWESCON26(August):1-9.
    Ruhe G., Eberlein A., and Pfahl D.(2003). Trade-off analysis for requirements selection [J]International Journal of Software Engineering and Knowledge Engineering,13(4):345-366.
    Sancho P, Juiz C, Puigjaner R, Chung L, and Subramanian N.(2007). An approach to ontology-aidedperformance engineering through NFR framework [C]. In: Proceedings of the6thinternational workshop on Software and performance:125-128.
    Shehata M, Eberlein A, and Fapojuwo A.(2007) A taxonomy for identifying requirementinteractions in software systems [J]. Computer Networks,51(2):398-425.
    Shehata M, Eberlein A, and Fapojuwo A.(2007) Using semi-formal methods for detectinginteractions among smart homes policies [J]. Science of Compter Programming,67(2-3):125-161.
    Shehata M.(2005) Detecting requirements interactions using semi-formal methods [D]. Ph.D. Thesis,University of Calgary, Alberta, Canada.
    Sindre G., and Opdahl A.(2005). Eliciting security requirements with misuse cases [J].Requirements Engineering Journal,10(1):34-44.
    Sirin E., Parsia B., Grau B., Kalyanpur A. and Katz Y.(2007). Pellet: a practical owl-dl reasoner [J].Journal of Web Semantics,5(1):51-53.
    Stevens W., Myers G., and Constantine L.(1974). Structured design [J]. IBM Systems Journal,13(2):115-139.
    Studer R., Benjamins V., and Fensel D.(1998). Knowledge engineering, principles and methods [J].Data and Knowledge Engineering,25(1-2):161-197.
    Supakkul S, and Chung L (2010b). Visualizing non-functional requirements patterns [C]. InProceedings of the5th International Workshop on Requirements EngineeringVisualization (REV2010), IEEE CS:25-34.
    Supakkul S, Hill T, Oladimeji EA, and Chung L.(2009) Capturing, organizing, and reusingknowledge of NFRs: an NFR pattern approach [C]. In Proceedings of the2ndInternationalWorkshop on Managing Requirements Knowledge (MARK2009), IEEE CS:75-84.
    Supakkul S., and Chung L.(2010a). Goal achievement evaluation in the NFR framework [EB/OL].http://www.utdallas.edu/~supakkul/NFR-modeling/.
    Supakkul S., Hill T., Chung L., Tun T.T., et al.(2010). An NFR pattern approach to dealing withNFRs [C]. In Proceedings of the18thIEEE International Conference on RequirementsEngineering (RE’2010), IEEE CS, USA:179-188.
    Sure Y., Angele J., and Staab S.(2002). OntoEdit: guiding ontology development by methodologyand inferencing [C]. On the Move to Meaningful Internet Systems, Proceedings ofConfederated International Conferences DOA, CoopIS and ODBASE:1205-1222.
    Svoboda P.(1990). Structured analysis. In Thayer and Dorfman ed., Tutorial: System and SoftwareRequirements Engineering [M]. IEEE CS:218-237.
    Tsarkov D. and Horrocks I.(2006). FaCT++description logic reasoner: system description[C].Automated Reasoning, Lecture Notes in Computer Science, Springer,4130:292-297.
    Uschold M., and Gruninger M..(1996). Ontologies: principles, methods, and applications [J].Knowledge Engineering Review,11(2):93-155.
    van Gurp J., Bosch J., and Svahnberg M..(2001) On the notion of variability in software productlines [C]. In Proceedings of the Working IEEE/IFIP Conference on Software Architecture(WICSA’01), IEEE CS:45-54.
    van Heijst G., Schreiber A., and Wielinga B.(1997). Using explicit ontologies in KBS development[J]. International Journal of Human-Computer Studies,46(2-3):183-292.
    van Lamsweerde A, Darimont R, Letier E.(1998) Managing conflicts in goal-driven requirementsengineering [J]. IEEE Transactions on Software Engineering,24(11):908-926.
    van Lamsweerde A.(2001). Goal-oriented requirements engineering: a guided tour [C]. InProceedings of5thInternational Symposium on Requirements Engineering:249-262.
    van Lamsweerde A.(2008) Requirements engineering: from craft to discipline[C]. in Proceedings ofthe16thACM SIGSOFT International Symposium on the Foundations of SoftwareEngineering:238-249.
    van Lamsweerde A., Brohez S., De Landtsheer R., and Janssens D.(2003). From system goals tointruder anti-goals: attack generation and resolution for security requirements engineering[C]. Requirements Engineering for High Assurance Systems (RHAS’03):49-56.
    Wang H, Mehta R, Supakkul S, and Chung L.(2011) Rule-based context-aware adaptation using agoal-oriented ontology [C]. Proceedings of the2011international workshop on SituationActivity&Goal awareness:67-76.
    Wang H., Li Y., Sun J., Zhang H, and Pan J.(2007) Verifying feature models using OWL. Journal ofWeb Semantics: Science,5(2):117-129.
    Wei B, and Jin Z.(2011) Characterizing the implementation of software non-functional requirementsfrom probabilistic perspective [C]. In Proceedings of the35thAnnual Conference onComputer Software and Applications (COMPSAC2011), IEEE CS:608-609.
    Wei B, Yin B, Jin Z, and Zowghi D.(2011b) rΣ: Automated reasoning tool for non-functionalrequirement goal models [C]. In Proceedings of the19thInternational on RequirementsEngineering Conference (RE2011), IEEE CS:337-338.
    Wei B., Jin Z., and Liu L.(2010) A formalism for extending the NFR framework to support thecomposition of the goal trees [C]. In Poroceedings of the17thAsia Pacific SoftwareEngineering Conference (APSEC2010), IEEE CS:23-32.
    Wei B., Jin Z., and Zowghi D.(2011a) An automatic reasoning mechanism for NFR goal models [C].In Proceedings of the5thInternational Symposium on Theoretical Aspects of SoftwareEngineering (TASE), IEEE CS:52-59.
    Weiss M, Esfandiari B, and Luo Y.(2007) Towards a classification of web service featureinteractions [J]. Computer Networks,51(2):359-381.
    Wirth N.(1996). Extended Backus-Naur Form (EBNF)[S]. ISO/IEC-14977.
    Yu E.(1997). Towards modeling and reasoning support for early-phase requirements engineering [C].In Proceedings of the3rd International Symposium on Requirements Engineering, IEEE,Annapolis, MD, USA:226-235.
    Yu E.(1997). Towards modeling and reasoning support for early-phase requirements engineering [C].In Proceedings of3rdInternational Symposium on Requirements Engineering:226-235.
    Yu E.(2009). Social Modeling and i*[M]. In Borgida et al (ed.): Conceptual Modeling: Foundationsand Applications-Essays in Honor of John Mylopoulos. LNCS,5600:99-121.
    Zave P.(1991). An insider’s evaluation of PAISLey [J]. IEEE Transaction on Software Engineering,17(3):212-225.
    Zave P., and Jackson M.(1997). Four dark corners of requirements engineering [J]. ACMTransactions on Software Engineering and Methodology,6(1):1-30.
    Zhang W, Mei H, and Zhao H.(2005) A feature-oriented approach to modeling requirementsdependencies [C]. In Proceedings of the13thIEEE International Conference onRequirements Engineering (RE‘05), IEEE CS:273-282.
    Zhao Y., Dong J., and Peng T.(2009). Ontology classification for semantic web-based softwareEngineering [J]. IEEE Transactions on Services Computing,2(4):303-317.
    Zimmermann, P.(1995). PGP Source Code and Internals [M]. MIT Press.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700