Please wait a minute...
J4  2010, Vol. 44 Issue (5): 881-886    DOI: 10.3785/j.issn.1008-973X.2010.05.008
    
Method for mapping software dependability requirements
based on quality function deployment
XIONG Wei, WANG Xiao-tun
School of Management, Zhejiang University, Hangzhou 310058, China
Download:   PDF(0KB) HTML
Export: BibTeX | EndNote (RIS)      

Abstract  

Aiming at the dependability requirements to architecture mapping in software engineering, a requirements mapping method based on quality function deployment (QFD) was proposed to assure and improve the software dependability. The dependability requirements were deployed into the entire development process by combining with the quantitative analysis of dependability requirements using quantification method of type 3 (QM3) and the house of quality (HOQ). And the requirements can be correctly and consistently fulfilled in the software development process by tracing and controlling the requirements using HOQ. A case study of a financial software development was used to illustrate the method. Results show that the method can effectively enhance the dependability of software system and assure the software quality.



Published: 19 March 2012
CLC:  TP 311  
Cite this article:

XIONG Wei, WANG Xiao-Tun. Method for mapping software dependability requirements
based on quality function deployment. J4, 2010, 44(5): 881-886.

URL:

http://www.zjujournals.com/eng/10.3785/j.issn.1008-973X.2010.05.008     OR     http://www.zjujournals.com/eng/Y2010/V44/I5/881


基于质量功能展开的可信软件需求映射方法

为了保证和提高软件的可信性,针对当前可信软件需求管理在将可信性需求向软件设计过程映射方面存在的不足,提出基于质量功能展开(QFD)方法的可信软件需求映射方法.该方法在用数量化理论3类(QM3)方法定量分析可信软件需求的基础上,借助QFD方法中的质量屋(HOQ)矩阵,将可信性需求映射到软件设计开发的整个过程,并在过程中追踪和控制这些需求,以使其在软件开发过程中得到正确而一致的实现,从而系统化地保证软件的可信性.用某金融软件系统的开发实例进行验证,说明所提方法能有效地管理和控制可信性需求,对提高软件系统的可信性和保证软件质量具有重要意义.

[1] 陈火旺,王戟,董威.高可信软件工程技术[J].电子学报,2003,31(12A):19331938.
CHEN Huowang,WANG Ji,DONG Wei. High confidence software engineering technologies [J]. The Chinese Journal of Electronics,2003,31(12A): 19331938.
[2] 刘克,单志广,王戟,等.“可行软件基础研究”重大研究计划综述[J].中国科学基金,2008,22(3): 145151.
LIU Ke,SHAN Zhiguang,WANG Ji,et al. Overview on major research plan of trustworthy software [J].Bulletin of National Natural Science Foundation of China,2008,22(3): 145151.
[3] LITTLEWOOD B,STRINGINI L. Software reliability and dependability: a roadmap [C]∥ Proceedings of the Conference on the Future of Software Engineering. Limerick: ACM,2000: 175188.
[4] AVIZIENIS A,LAPRIE J C,RANDELL B, et al. Basic concepts and taxonomy of dependable and secure computing [J].IEEE Transactions on Dependable and Secure Computing,2004,1(1): 1133.
[5] SAIEDIAN H,DALE R. Requirements engineering: making the connection between the software developer and customer [J].Information and Software Technology,2000,42(6): 419428.
[6] CHAN L K,WU M L. Quality function deployment: a literature review [J].European Journal of Operational Research,2002,143(3): 463497.
[7] HAAG S, RAJA M K, SCHKADE L L. Quality function deployment usage in software development [J]. Communications of the ACM,1996,39(1): 4149.
[8] AVIZIENIS A,LAPRIE J C,RANDELL B, et al. Basic concepts and taxonomy of dependable and secure computing [J].IEEE Transactions on Dependable and Secure Computing,2004,1(1): 1133.
[9] LAPRIE J C. Dependability: basic concepts and terminology,dependable computing and fault tolerance [M].New York: SpringerVerlag,1992: 513.
[10] Trusted Computing Group. TCG specification architecture overview [EB/OL]. [20080527]. http:∥www.trustedcomputinggroup.org/groups/TCG_1_4_Architecture_Overview.pdf.
[11] IFIP—International Federation for Information Processing WG10.4. [EB/OL]. [20090822]. http:∥www.dependability.org/wg10.4/.
[12] 杨仕平,熊光泽,桑楠.安全关键实时系统高可信集成技术的研究[J].电子学报,2003,31(8): 12371241.
YANG Shiping,XIONG Guangze,SANG Nan. Research on high dependability integration technology of safety critical real time systems [J]. The Chinese Journal of Electronics,2003,31(8): 12371241.
[13] DONZELLI P,BASILI V.A practical framework for eliciting and modeling system dependability requirements: experience from the NASA high dependability computing project [J]. Journal of Systems and Software,2006,79(1): 107119.
[14] WESTFAL L. Software requirements engineering: what,why,who,when,and how [J]. Software Quality Professional,2005,7(4): 1726.
[15] BENMENACHEM M. Towards management of software as assets: a literature review with additional sources [J]. Information and Software Technology,2008,50(4): 241258.
[16] NIEMEL E, IMMONEN A. Capturing quality requirements of product family architecture [J]. Information and Software Technology,2007,49(1112): 11071120.
[17] XU L H, ZIV H, ALSPAUGH T A, et al. An architectural pattern for nonfunctional dependability requirements [J].Journal of Systems and Software,2006, 79(10): 13701378.
[18] XIONG W,WATANABE Y,SHINDO H. A description approach to software by HOQ extension concept and its quantitative structuralization [J].Journal of Software,2005,16(1): 816.
[19] 熊伟.质量机能展开[M].北京:化学工业出版社,2005: 3840.

[1] KE Hai-feng, YING Jing. Real-time license character recognition technology based on R-ELM[J]. J4, 2014, 48(2): 0-0.
[2] JIN Cang-hong, WU Ming-hui, YING Jing. A context-aware index based text extraction framework[J]. J4, 2013, 47(9): 1537-1546.
[3] ZHU Fan-wei, WU Ming-hui, YING Jing. Faceted Web search approach for large scale unstructured data[J]. J4, 2013, 47(6): 990-999.
[4] FENG Pei-en, LIU Yu, QIU Qing-ying, LI Li-xin. Strategies of efficiency improvement for Eclat algorithm[J]. J4, 2013, 47(2): 223-230.
[5] LIU Ying, CHEN Ling, CHEN Gen-cai, ZHAO Jiang-qi, WANG Jing-chang. Approach for collection selection based on click-through data[J]. J4, 2013, 47(1): 23-28.
[6] YIN Ting, XIAO Min, CHEN Ling, ZHAO Jiang-qi, WANG Jing-chang. CQPM based OLAP query log mining and recommendation[J]. J4, 2012, 46(11): 2052-2060.
[7] XIAO Min, CHEN Iing, XIA Hai-yuan, CHEN Gen-cai. Data warehouse native feature based OLAP querying with keywords[J]. J4, 2012, 46(6): 974-979.
[8] ZHANG Li-ping, LI Song, HAO Xiao-hong, HAO Zhong-xiao. Jrv  rough Vague region relation[J]. J4, 2012, 46(1): 105-111.
[9] CHEN Ling, XU Xiao-long, YANG Qing, CHEN Gen-cai. Wireless signal strength propagation model
 base on cubic spline interpolation
[J]. J4, 2011, 45(9): 1521-1527.
[10] WU Ming-hui, YING Jing. Business process modeling and formal verification[J]. J4, 2011, 45(2): 280-287.
[11] FU Chao-yang, GAO Ji, ZHOU You-ming. Service discovery based on integrating lexical multi-level hashing
with subsumption semantics
[J]. J4, 2010, 44(12): 2274-2283.
[12] YANG Qing, CHEN Ling, CHEN Gen-Cai. Estimating walking distance based on single accelerometer[J]. J4, 2010, 44(9): 1681-1686.
[13] ZHANG Yin, HE Gao, DIAO Li-Na, ZHANG San-Yuan. Abstract state machine design of Internetware model[J]. J4, 2010, 44(5): 923-929.
[14] JIANG Chao, YING Jing, TUN Meng-Hui, et al. Feature increment oriented  approach for software product line analysis[J]. J4, 2009, 43(12): 2142-2148.
[15] CHEN Bin, TAO Min. Mining associated and item-item correlated frequent patterns[J]. J4, 2009, 43(12): 2171-2177.