Toward a ucm-based approach for recovering system availability requirements from execution traces

Jameleddine Hassine, Abdelwahab Hamou-Lhadj

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

Software maintenance accounts for a significant proportion of the cost of the software life cycle. Software engineers must spend a considerable amount of time understanding the software system func- tional attributes and non-functional (e.g., availability, security, etc.) as- pects prior to performing a maintenance task. In this paper, we propose a dynamic analysis approach to recover availability requirements from system execution traces. Availability requirements are described and vi- sualized using the Use Case Maps (UCM) language of the ITU-T User Requirements Notation (URN) standard, extended with availability an- notations. Our UCM-based approach allows for capturing availability re- quirements at higher levels of abstraction from low-level execution traces. The resulting availability UCM models can then be analyzed to reveal system availability shortcomings. In order to illustrate and demonstrate the feasibility of the proposed approach, we apply it to a case study of a network implementing the HSRP (Hot Standby Router Protocol) redundancy protocol.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
EditorsDaniel Amyot, Pau Fonseca i Casas, Gunter Mussbacher
PublisherSpringer Verlag
Pages48-63
Number of pages16
ISBN (Electronic)9783319117423
DOIs
StatePublished - 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8769
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Bibliographical note

Publisher Copyright:
© Springer International Publishing Switzerland 2014.

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Toward a ucm-based approach for recovering system availability requirements from execution traces'. Together they form a unique fingerprint.

Cite this