The contributions of this work are 1) the integra-
tion of aspects into the problem frames approach, 2)
a structured way of separating base, quality and as-
pect requirements, starting from a textual description,
3) the detection of implicit qualities given by aspects,
4) identification of all base requirements relevant for a
quality and the related aspects, 5) a structured method
to weave base and aspect requirements, and 6) the in-
tegration of an interactions analysis between the re-
sulting requirements. The AORE4PF method is 7)
tool-supported in most steps.
For future work, we plan to improve the tool sup-
port and provide an integrated tool chain. Addition-
ally, we plan to integrate our new model elements into
more already existing methods and analyses based on
UML4PF to cover a broader spectrum of qualities.
ACKNOWLEDGEMENTS
Part of this work is funded by the German Research
Foundation (DFG) under grant number HE3322/4-2.
REFERENCES
Alebrahim, A., Choppy, C., Faßbender, S., and Heisel, M.
(2014a). Optimizing functional and quality require-
ments according to stakeholders’ goals. In System
Quality and Software Architecture. Elsevier. to appear.
Alebrahim, A., Faßbender, S., Heisel, M., and Meis, R.
(2014b). Problem-based requirements interaction
analysis. In Requirements Engineering: Foundation
for Software Quality, volume 8396 of LNCS, pages
200–215. Springer.
Alrajeh, D., Kramer, J., Russo, A., and Uchitel, S. (2009).
Learning operational requirements from goal models.
In IEEE 31st International Conference on Software
Engineering, pages 265–275. IEEE Computer Soci-
ety.
Baniassad, E. and Clarke, S. (2004). Finding as-
pects in requirements with Theme/Doc. In Early
Aspects: Aspect-Oriented Requirements Engi-
neering and Architecture Design, pages 15–22.
http://trese.cs.utwente.nl/workshops/early-aspects-
2004/workshop papers.htm.
Beckers, K., Faßbender, S., Heisel, M., and Meis, R.
(2014). A problem-based approach for computer
aided privacy threat identification. In Privacy Tech-
nologies and Policy, volume 8319 of LNCS, pages 1–
16. Springer.
Beckers, K., Faßbender, S., Heisel, M., and Paci, F. (2013).
Combining goal-oriented and problem-oriented re-
quirements engineering methods. In Availability, Reli-
ability, and Security in Information Systems and HCI,
volume 8127 of LNCS, pages 178–194. Springer.
Boehm, B. W. and Papaccio, P. N. (1988). Understanding
and controlling software costs. IEEE Transactions on
Software Engineering, 14(10):1462–1477.
Cavusoglu, H., Mishra, B., and Raghunathan, S. (2004).
The effect of internet security breach announce-
ments on market value: Capital market reactions for
breached firms and internet security developers. In-
ternational Journal of Electronic Commerce, 9(1):70–
104.
Conejero, J. M., Hernandez, J., Jurado, E., and van den
Berg, K. (2010). Mining early aspects based on syn-
tactical and dependency analyses. Science of Com-
puter Programming, 75(11).
C
ˆ
ot
´
e, I., Hatebur, D., Heisel, M., and Schmidt, H. (2011).
UML4PF - a tool for problem-oriented requirements
analysis. In Proceedings of the 19th IEEE Interna-
tional Requirements Engineering Conference, pages
349–350. IEEE Computer Society.
Faßbender, S. and Heisel, M. (2013). From problems
to laws in requirements engineering using model-
transformation. In ICSOFT ’13, pages 447–458.
SciTePress.
Faßbender, S., Heisel, M., and Meis, R. (2014). Functional
requirements under security pressure. In ICSOFT ’14.
SciTePress. to appear.
Firesmith, D. (2003). Specifying good requirements.
Journal of Object Technology, 2(4):77–87.
http://www.jot.fm/issues/issue 2003 07/column7.
Grundy, J. C. (1999). Aspect-oriented requirements engi-
neering for component-based software systems. In
Proceedings of the IEEE International Symposium on
Requirements Engineering, pages 84–91, Washington,
DC, USA. IEEE Computer Society.
Hatebur, D. and Heisel, M. (2010). A UML profile for re-
quirements analysis of dependable software. In Com-
puter Safety, Reliability, and Security, volume 6351 of
LNCS, pages 317–331. Springer.
Hofmann, H. and Lehner, F. (2001). Requirements engi-
neering as a success factor in software projects. IEEE
Software, 18(4):58–66.
Jackson, M. (2001). Problem Frames. Analyzing and
structuring software development problems. Addison-
Wesley.
Jackson, M. and Zave, P. (1995). Deriving specifications
from requirements: an example. In ICSE, USA, pages
15–24. ACM Press.
Jacobson, I. and Ng, P.-W. (2004). Aspect-Oriented Soft-
ware Development with Use Cases. Addison-Wesley
Professional.
Khansa, L., Cook, D. F., James, T., and Bruyaka, O. (2012).
Impact of HIPAA provisions on the stock market value
of healthcare institutions, and information security
and other information technology firms. Computers
& Security, 31(6):750 – 770.
Kienzle, J., Guelfi, N., and Mustafiz, S. (2010). Crisis man-
agement systems: A case study for aspect-oriented
modeling. In Katz, S., Mezini, M., and Kienzle, J., ed-
itors, Transactions on Aspect-Oriented Software De-
velopment VII, volume 6210 of LNCS, pages 1–22.
Springer.
Aspect-orientedRequirementsEngineeringwithProblemFrames
155