validation method to improve behavioral flows on uml requirements analysis model by cross-checking with state transition model

03/01/2021
by   Hikaru Morita, et al.
0

We propose a method to evaluate and improve the validity of required specifications by comparing models from different viewpoints. Inconsistencies are automatically extracted from the model in which the analyst defines the service procedure based on the initial requirement; thereafter, the analyst automatically compares it with a state transition model from the same initial requirement that has been created by an evaluator who is different from the analyst. The identified inconsistencies are reported to the analyst to enable the improvement of the required specifications. We develop a tool for extraction and comparison and then discuss its effectiveness by applying the method to a requirements specification example.

READ FULL TEXT
research
03/31/2020

Cross-project Classification of Security-related Requirements

We investigate the feasibility of using a classifier for security-relate...
research
02/11/2022

NALABS: Detecting Bad Smells in Natural Language Requirements and Test Specifications

In large-scale embedded system development, requirement and test specifi...
research
09/03/2022

Model-based Analysis and Specification of Functional Requirements and Tests for Complex Automotive Systems

The specification of requirements and tests are crucial activities in au...
research
02/11/2022

Why just FRET when you can Refactor? Retuning FRETISH Requirements

Formal verification of a software system relies on formalising the requi...
research
01/25/2023

Tutorial on the Executable ASM Specification of the AB Protocol and Comparison with TLA^+

The main aim of this report is to provide an introductory tutorial on th...
research
06/14/2022

An Intelligent Assistant for Converting City Requirements to Formal Specification

As more and more monitoring systems have been deployed to smart cities, ...
research
08/16/2021

OACAL: Finding Module-consistent Specifications to Secure Systems from Weakened User Obligations

Users interacting with a system through UI are typically obliged to perf...

Please sign up or login with your details

Forgot password? Click here to reset