Compartilhamento de Modelos iStar 2.0 em Ferramentas de Modelagem Online - o Caso da piStar
##plugins.themes.bootstrap3.article.main##
Resumo
Para facilitar e ajudar na tomada de decisões durante a fase de engenharia de requisitos, foi proposta a linguagem de modelos iStar 2.0 com uma visão social, onde os atores de um modelo se relacionam entre si, através de relações de dependência. Atualmente existe uma ferramenta gráfica para criação de tais modelos, a piStar. Nela, o modelo é criado em um navegador de internet e salvo na máquina do usuário. Um grande risco é de que este arquivo, salvo localmente na máquina, possa ser perdido ou até mesmo corrompido. Neste trabalho foi desenvolvida uma solução para ajudar no compartilhamento desses modelos através de um web service. O web service possibilita o armazenamentodos modelos criados e a disponibilização dos mesmos através de uma URL. Foi feita a implementação em Java de um web service que permitisse o piStar compartilhar os modelos criados.
Downloads
Não há dados estatísticos.
##plugins.themes.bootstrap3.article.details##
Como Citar
Santos, M., & Pimentel, J. (2018). Compartilhamento de Modelos iStar 2.0 em Ferramentas de Modelagem Online - o Caso da piStar. Revista De Engenharia E Pesquisa Aplicada, 3(2). https://doi.org/10.25286/repa.v3i2.885
Seção
Engenharia da Computação
Referências
[1] S. Y. Eric, “Social modeling and i*,” in Conceptual
Modeling: Foundations and Applications,
pp. 99–121, Springer, 2009.
[2] S. Eric, Social modeling for requirements engineering.
Mit Press, 2011.
[3] J. Mylopoulos, “Information modeling in the time
of the revolution,” Information systems, vol. 23,
no. 3-4, pp. 127–155, 1998.
[4] F. Dalpiaz, X. Franch, e J. Horkoff, “istar 2.0 language
guide,” arXiv preprint: 1605.07767, 2016.
[5] P. Lima, J. Vilela, E. Gonçalves, J. Pimentel, A.
Holanda, J. Castro, F. Alencar, e M. Lencastre,
“Scalability of istar: a systematic mapping study,”
2016.
[6] J. Pimentel, J. Vilela, e J. Castro, “Web tool for
goal modelling and statechart deriva- tion,” in Requirements
Engineering Conference (RE), 2015
IEEE 23rd International, pp. 292– 293, IEEE,
2015.
[7] E. Yu, “Modelling strategic relationships for process
reengineering,” Social Modeling for Requirements
Engineering, vol. 11, p. 2011, 2011.
[8] T. Bray, “The javascript object notation (json)
data interchange format,” 2014.
[9] P. J. Leach, M. Mealling, e R. Salz, “A univesally
unique identifier (uuid) urn namespace” 2005.
[10] “Java 8 class uuid documentation.”
http://docs.oracle.com/javase/8/docs/api/java/util/UUID.html.
Acessado: 25 de Julho de
2017.
[11] Barbosa, Eber Donizeti, e Reinaldo de Oliveira
Castro. "Desenvolvimento de Software Seguro:
Conhecendo e Prevenindo Ataques Sql Injection
e Cross-site Scripting (XSS)." Revista TIS, vol. 4,
2016.
[12] I. Hydara, A. B. M. Sultan, H. Zulzalil, e N.
Admodisastro, “Current state of research on
cross-site scripting (xss)–a systematic literature
review,” Information and Software Technology,
vol. 58, pp. 170–186, 2015.
[13] W. G. Halfond, J. Viegas, e A. Orso, “A classification
of sql-injection attacks and countermeasures,”
in Proceedings of the IEEE International
Symposium on Secure Software Engineering,
vol. 1, pp. 13–15, IEEE, 2006.
[14] R. L. Costello et al., “Rest (representational
state transfer),” visitado em Jun, vol. 26, 2002.
[15] M. Yener e A. Theedom, Professional Java EE
design patterns. John Wiley & Sons, 2014.
[16] “Spring framework.” https://projects.spring.io/spring-framework/.
Acessado: 25
de Julho de 2017.
[17] “How to fix sql injection using mybatis.”
https://software-security.sans.org/developerhow-to/fix-sql-injection-in-java-mybatis.
Acessado:
21 de Julho de 2017.
[18] “Spring security cross-site scripting.”
https://defensivecode.wordpress.com/2013/09/03/spring-
security-xss/.
Acessado: 22 de Julho de 2017.
[19] J. Horkoff, T. Li, F.-L. Li, M. Salnitri, E. Cardoso,
P. Giorgini, J. Mylopoulos, e J. Pimentel,
“Taking goal models downstream: a syste- matic
roadmap,” in Research Challenges in In- formation
Science (RCIS), 2014 IEEE Eighth International
Conference on, pp. 1–12, IEEE, 2014.
[20] “istar wiki.” http://istarwiki.org/. Acessado: 23 de
Julho de 2017.
[21] A. Jaqueira, M. Lucena, F. M. Alencar, J. Castro,
e E. Aranha, “Using i* models to enrich user
stories” iStar, vol. 13, pp. 55–60, 2013.
[22] X. Wen e G. Jianhua, “Research of web application
framework based on spring mvc and mybatis,”
Microcomputer Applications, vol. 7, pp. 1–
4, 2012.
[23] J. Fonseca, M. Vieira, e H. Madeira, “Testing and
comparing web vulnerability scanning tools for
sql injection and xss attacks,” in Dependa- ble
Computing, 2007. PRDC 2007. 13th Pacific Rim
International Symposium on, pp. 365–372, IEEE,
2007.
[24] Fielding, Roy, et al. Hypertext transfer protocol--
HTTP/1.1. No. RFC 2616. 1999.
[25] Rescorla, Eric; Schiffman, A. The secure hypertext
transfer protocol. 1999.
Modeling: Foundations and Applications,
pp. 99–121, Springer, 2009.
[2] S. Eric, Social modeling for requirements engineering.
Mit Press, 2011.
[3] J. Mylopoulos, “Information modeling in the time
of the revolution,” Information systems, vol. 23,
no. 3-4, pp. 127–155, 1998.
[4] F. Dalpiaz, X. Franch, e J. Horkoff, “istar 2.0 language
guide,” arXiv preprint: 1605.07767, 2016.
[5] P. Lima, J. Vilela, E. Gonçalves, J. Pimentel, A.
Holanda, J. Castro, F. Alencar, e M. Lencastre,
“Scalability of istar: a systematic mapping study,”
2016.
[6] J. Pimentel, J. Vilela, e J. Castro, “Web tool for
goal modelling and statechart deriva- tion,” in Requirements
Engineering Conference (RE), 2015
IEEE 23rd International, pp. 292– 293, IEEE,
2015.
[7] E. Yu, “Modelling strategic relationships for process
reengineering,” Social Modeling for Requirements
Engineering, vol. 11, p. 2011, 2011.
[8] T. Bray, “The javascript object notation (json)
data interchange format,” 2014.
[9] P. J. Leach, M. Mealling, e R. Salz, “A univesally
unique identifier (uuid) urn namespace” 2005.
[10] “Java 8 class uuid documentation.”
http://docs.oracle.com/javase/8/docs/api/java/util/UUID.html.
Acessado: 25 de Julho de
2017.
[11] Barbosa, Eber Donizeti, e Reinaldo de Oliveira
Castro. "Desenvolvimento de Software Seguro:
Conhecendo e Prevenindo Ataques Sql Injection
e Cross-site Scripting (XSS)." Revista TIS, vol. 4,
2016.
[12] I. Hydara, A. B. M. Sultan, H. Zulzalil, e N.
Admodisastro, “Current state of research on
cross-site scripting (xss)–a systematic literature
review,” Information and Software Technology,
vol. 58, pp. 170–186, 2015.
[13] W. G. Halfond, J. Viegas, e A. Orso, “A classification
of sql-injection attacks and countermeasures,”
in Proceedings of the IEEE International
Symposium on Secure Software Engineering,
vol. 1, pp. 13–15, IEEE, 2006.
[14] R. L. Costello et al., “Rest (representational
state transfer),” visitado em Jun, vol. 26, 2002.
[15] M. Yener e A. Theedom, Professional Java EE
design patterns. John Wiley & Sons, 2014.
[16] “Spring framework.” https://projects.spring.io/spring-framework/.
Acessado: 25
de Julho de 2017.
[17] “How to fix sql injection using mybatis.”
https://software-security.sans.org/developerhow-to/fix-sql-injection-in-java-mybatis.
Acessado:
21 de Julho de 2017.
[18] “Spring security cross-site scripting.”
https://defensivecode.wordpress.com/2013/09/03/spring-
security-xss/.
Acessado: 22 de Julho de 2017.
[19] J. Horkoff, T. Li, F.-L. Li, M. Salnitri, E. Cardoso,
P. Giorgini, J. Mylopoulos, e J. Pimentel,
“Taking goal models downstream: a syste- matic
roadmap,” in Research Challenges in In- formation
Science (RCIS), 2014 IEEE Eighth International
Conference on, pp. 1–12, IEEE, 2014.
[20] “istar wiki.” http://istarwiki.org/. Acessado: 23 de
Julho de 2017.
[21] A. Jaqueira, M. Lucena, F. M. Alencar, J. Castro,
e E. Aranha, “Using i* models to enrich user
stories” iStar, vol. 13, pp. 55–60, 2013.
[22] X. Wen e G. Jianhua, “Research of web application
framework based on spring mvc and mybatis,”
Microcomputer Applications, vol. 7, pp. 1–
4, 2012.
[23] J. Fonseca, M. Vieira, e H. Madeira, “Testing and
comparing web vulnerability scanning tools for
sql injection and xss attacks,” in Dependa- ble
Computing, 2007. PRDC 2007. 13th Pacific Rim
International Symposium on, pp. 365–372, IEEE,
2007.
[24] Fielding, Roy, et al. Hypertext transfer protocol--
HTTP/1.1. No. RFC 2616. 1999.
[25] Rescorla, Eric; Schiffman, A. The secure hypertext
transfer protocol. 1999.