Requirements
Validating and Tracking Requirements through a Configuration Structure
Padmalata Nistala
Priyanka Kumari
I. INTRODUCTION
According to ISO/IEC 15288 systems definition [1], A
system is a combination of interacting elements organized to
achieve one or more stated purposes. As the software system
transforms from a set of needs to a final product through
various forms, at each stage there is a high possibility of loss of
quality due to defects in transformation of configuration items
from previous phase. Thus, an understanding of system model
[1] is important not only to understand what is being
developed but also to understand how it is being developed.
Though a lot of traceability tools and research is trying to
overcome the problem in software industry, managing the
requirements to perform traceability continues to be a primary
issue. Kannenberg and Saiedian in their article [2] reflects the
problem of requirement source traceability without which it is
difficult to determine the incorporation of requirement into
c 2013 IEEE
978-1-4673-5765-4/13/$31.00
320
Figure 1.
321
Config Item X
Config Item Y
Direction
Inconsistency Type
Analysis
Analysis description
Count
322
requirements.
B = Total number of elicited requirements
C = Number of missing requirements identified
III. CASE STUDY
This framework has been piloted for a critical business
system for a large insurance client of TCS. The framework was
implemented to carry out the due diligence exercise for
requirements, find out the inconsistencies and validate the
alignment and traceability of elicited requirements.
The actual implementation of this requirement consistency
analysis was carried by two researchers who were also
involved in designing the framework with the knowledge help
of business analyst. The implementation period was two
months which resulted in the formation of requirement
configuration structure and the consistency index which were
also validated by the SMEs.
The pilot application was an eRegistration System which
provides different methods of automatically registering external
customers and maintaining and accessing their accounts. The
existing registration process is enhanced with implementation
of security framework for few processes. The new application
also integrates the Management Information (MI) report
creation. The following section details the framework
deployment for the case.
A. Layers of the Framework
The first step is identifying the layers and configuration
items. The framework implementation for the registration
system is illustrated in Fig 2 and described below for each layer.
323
P2:Bulk
Registration
C.Item X
C.Item Y
Requirements
Direction
Type
Forward
Missing
Analysis
1)
2)
P2:Bulk
Registration
P2:Bulk
Registration
Requirements
Forward
Missing
1)
Use Case
Forward
Missing
1)
P3:Consumer
Self Elected
Registration
P5:Login and
manage account
Requirements
Backward
Missing
1)
Requirements
Forward
Erroneous
1)
B. Configuration Structure
The above figure-2, illustrates the requirement
configuration structure (RCS) created for eRegistration
System linking all the configuration items, taking an
illustration of bulk registration process to fulfill the objective
- to provide automatic registration facility to the customer.
The process is divided into two sub-processes bulk
registration for product customer and bulk registration for
workplace customer All the requirements and use cases are
correctly mapped to these sub-processes as shown in figure-2.
The first row in figure shows the missing use case when going
forward from requirements to specification layer. Thus, it
identifies the completeness issue with use case.
Similarly, the sub-process (P2-1) has a requirement on
generation of action code but the listed requirements are
insufficient and do not adequately satisfy the objectives of
activation code generation process. This is a correctness
related problem with requirements.
C. Consistency Analysis Method
Based on the RCS structure created, each relationship is
analyzed for consistency in terms of completeness and
correctness as described in the framework. The inconsistencies
found in RCS are logged into configuration inconsistency
matrix (CIM). The table-2 shows a view of the configuration
inconsistency matrix (CIM). The analysis is carried out through
tracking the flow and validating the information. The
inconsistencies listed in CIM have been validated with the
SMEs.
D. Requirement Consistency Index
Figure-3 depicts the summary of the requirement
inconsistencies as analyzed from configuration inconsistency
matrix (CIM). It also segregates the data based on correctness
and completeness related problems. It can be seen from the
graph that the number of inconsistencies originated from
requirements are very high.
Count
1
1
1
48%
324
[3]
IV. CONCLUSION
[5]
[6]
[4]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
ACKNOWLEDMENT
[16]
[17]
[18]
REFERENCES
Systems Engineering Guide for ISO/IEC (System Life Cycle
Processes) 15288 , July 2002 .
[2] A. Kannenberg, H. Saiedian, Why Software Requirements
Traceability Remains a Challenge, 14 Crosstalk - Journal of
Defense
Software
Engineering,
July/August
2009,
www.stsc.hill.af.mil
[1]
[19]
325