Visible to the public Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns

TitleTowards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns
Publication TypeConference Paper
Year of Publication2012
AuthorsBreaux, T.D., Hibshi, H., Rao, A, Lehker, J.
Conference NameRequirements Patterns (RePa), 2012 IEEE Second International Workshop on
Date PublishedSept
Keywordsabstraction, CMU, cognitive psychology, Documentation, formal verification, information security guidelines, knowledge reuse, Natural languages, object-oriented methods, pattern experimentation, Pattern recognition, patternmining, patterns, psychology, requirements engineering, requirements engineering pattern, science of security, security, security knowledge, security of data, security patterns, Software, software reusability, Taxonomy
Abstract

Despite the abundance of information security guidelines, system developers have difficulties implementing technical solutions that are reasonably secure. Security patterns are one possible solution to help developers reuse security knowledge. The challenge is that it takes experts to develop security patterns. To address this challenge, we need a framework to identify and assess patterns and pattern application practices that are accessible to non-experts. In this paper, we narrowly define what we mean by patterns by focusing on requirements patterns and the considerations that may inform how we identify and validate patterns for knowledge reuse. We motivate this discussion using examples from the requirements pattern literature and theory in cognitive psychology.

URLhttp://ieeexplore.ieee.org/document/6359975/
DOI10.1109/RePa.2012.6359975
Citation Key6359975