[{"status":"public","publication":"Proceedings of the 14th International Conference on Model-Based Software and Systems Engineering","type":"conference","language":[{"iso":"eng"}],"_id":"65261","department":[{"_id":"241"},{"_id":"662"}],"user_id":"49934","year":"2026","citation":{"short":"R. Trentinaglia, T. Koch, E. Bodden, in: Proceedings of the 14th International Conference on Model-Based Software and Systems Engineering, SCITEPRESS - Science and Technology Publications, 2026.","bibtex":"@inproceedings{Trentinaglia_Koch_Bodden_2026, title={Using Attack and Failure Propagation Analysis for Context-Aware Security Control Suggestions}, DOI={<a href=\"https://doi.org/10.5220/0014278000004058\">10.5220/0014278000004058</a>}, booktitle={Proceedings of the 14th International Conference on Model-Based Software and Systems Engineering}, publisher={SCITEPRESS - Science and Technology Publications}, author={Trentinaglia, Roman and Koch, Thorsten and Bodden, Eric}, year={2026} }","mla":"Trentinaglia, Roman, et al. “Using Attack and Failure Propagation Analysis for Context-Aware Security Control Suggestions.” <i>Proceedings of the 14th International Conference on Model-Based Software and Systems Engineering</i>, SCITEPRESS - Science and Technology Publications, 2026, doi:<a href=\"https://doi.org/10.5220/0014278000004058\">10.5220/0014278000004058</a>.","apa":"Trentinaglia, R., Koch, T., &#38; Bodden, E. (2026). Using Attack and Failure Propagation Analysis for Context-Aware Security Control Suggestions. <i>Proceedings of the 14th International Conference on Model-Based Software and Systems Engineering</i>. <a href=\"https://doi.org/10.5220/0014278000004058\">https://doi.org/10.5220/0014278000004058</a>","ama":"Trentinaglia R, Koch T, Bodden E. Using Attack and Failure Propagation Analysis for Context-Aware Security Control Suggestions. In: <i>Proceedings of the 14th International Conference on Model-Based Software and Systems Engineering</i>. SCITEPRESS - Science and Technology Publications; 2026. doi:<a href=\"https://doi.org/10.5220/0014278000004058\">10.5220/0014278000004058</a>","chicago":"Trentinaglia, Roman, Thorsten Koch, and Eric Bodden. “Using Attack and Failure Propagation Analysis for Context-Aware Security Control Suggestions.” In <i>Proceedings of the 14th International Conference on Model-Based Software and Systems Engineering</i>. SCITEPRESS - Science and Technology Publications, 2026. <a href=\"https://doi.org/10.5220/0014278000004058\">https://doi.org/10.5220/0014278000004058</a>.","ieee":"R. Trentinaglia, T. Koch, and E. Bodden, “Using Attack and Failure Propagation Analysis for Context-Aware Security Control Suggestions,” 2026, doi: <a href=\"https://doi.org/10.5220/0014278000004058\">10.5220/0014278000004058</a>."},"publication_status":"published","title":"Using Attack and Failure Propagation Analysis for Context-Aware Security Control Suggestions","doi":"10.5220/0014278000004058","publisher":"SCITEPRESS - Science and Technology Publications","date_updated":"2026-03-31T13:53:55Z","author":[{"first_name":"Roman","last_name":"Trentinaglia","orcid":"0000-0001-9728-4991","id":"49934","full_name":"Trentinaglia, Roman"},{"first_name":"Thorsten","last_name":"Koch","id":"13616","full_name":"Koch, Thorsten"},{"full_name":"Bodden, Eric","id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","first_name":"Eric"}],"date_created":"2026-03-31T13:52:36Z"},{"title":"Security Belts: A Maturity Model for DevOps Teams to Increase the Software Security of their Product - An Experience Report","conference":{"end_date":"2024-08-17","location":"Salt Lake City","name":" 30th Americas Conference on Information Systems","start_date":"2024-08-15"},"date_updated":"2024-08-09T08:55:49Z","date_created":"2024-05-02T08:57:52Z","author":[{"first_name":"Samira","last_name":"Taaibi","id":"55800","full_name":"Taaibi, Samira"},{"id":"3901","full_name":"Dziwok, Stefan","last_name":"Dziwok","orcid":"http://orcid.org/0000-0002-8679-6673","first_name":"Stefan"},{"last_name":"Hermerschmidt","full_name":"Hermerschmidt, Lars","first_name":"Lars"},{"first_name":"Thorsten","last_name":"Koch","id":"13616","full_name":"Koch, Thorsten"},{"last_name":"Merschjohann","full_name":"Merschjohann, Sven","id":"11394","first_name":"Sven"},{"full_name":"Vollmary, Mark","last_name":"Vollmary","first_name":"Mark"}],"year":"2024","citation":{"ama":"Taaibi S, Dziwok S, Hermerschmidt L, Koch T, Merschjohann S, Vollmary M. Security Belts: A Maturity Model for DevOps Teams to Increase the Software Security of their Product - An Experience Report.","ieee":"S. Taaibi, S. Dziwok, L. Hermerschmidt, T. Koch, S. Merschjohann, and M. Vollmary, “Security Belts: A Maturity Model for DevOps Teams to Increase the Software Security of their Product - An Experience Report,” presented at the  30th Americas Conference on Information Systems, Salt Lake City.","chicago":"Taaibi, Samira, Stefan Dziwok, Lars Hermerschmidt, Thorsten Koch, Sven Merschjohann, and Mark Vollmary. “Security Belts: A Maturity Model for DevOps Teams to Increase the Software Security of Their Product - An Experience Report,” n.d.","mla":"Taaibi, Samira, et al. <i>Security Belts: A Maturity Model for DevOps Teams to Increase the Software Security of Their Product - An Experience Report</i>.","bibtex":"@inproceedings{Taaibi_Dziwok_Hermerschmidt_Koch_Merschjohann_Vollmary, title={Security Belts: A Maturity Model for DevOps Teams to Increase the Software Security of their Product - An Experience Report}, author={Taaibi, Samira and Dziwok, Stefan and Hermerschmidt, Lars and Koch, Thorsten and Merschjohann, Sven and Vollmary, Mark} }","short":"S. Taaibi, S. Dziwok, L. Hermerschmidt, T. Koch, S. Merschjohann, M. Vollmary, in: n.d.","apa":"Taaibi, S., Dziwok, S., Hermerschmidt, L., Koch, T., Merschjohann, S., &#38; Vollmary, M. (n.d.). <i>Security Belts: A Maturity Model for DevOps Teams to Increase the Software Security of their Product - An Experience Report</i>.  30th Americas Conference on Information Systems, Salt Lake City."},"publication_status":"accepted","has_accepted_license":"1","ddc":["000"],"keyword":["Software security","maturity model"],"language":[{"iso":"eng"}],"file_date_updated":"2024-05-02T08:54:21Z","_id":"53811","user_id":"55800","department":[{"_id":"662"}],"abstract":[{"text":"Persistent security challenges plague DevOps teams due to a deficiency in expertise regarding security tools and methods, as evidenced by frequent security incidents. Existing maturity models fail to adequately address the specific needs of DevOps teams. In response, this paper proposes \"Security Belts,\" a novel maturity model inspired by martial arts ranking systems. This model aims to assist DevOps teams in enhancing their security capabilities by providing a structured approach, starting with fundamental activities and progressing to more advanced techniques. Drawing from the experiences of monitoring 21 teams, the paper presents lessons learned and offers actionable advice for refining maturity models tailored to software quality improvement.","lang":"eng"}],"file":[{"date_created":"2024-05-02T08:54:21Z","creator":"staaibi","date_updated":"2024-05-02T08:54:21Z","file_id":"53812","file_name":"AMCIS2024_final_submission_maturity model security belt paper.pdf","access_level":"closed","file_size":540990,"content_type":"application/pdf","relation":"main_file","success":1}],"status":"public","type":"conference"},{"status":"public","type":"conference","publication":"Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development","language":[{"iso":"eng"}],"user_id":"13616","department":[{"_id":"241"},{"_id":"662"}],"_id":"29844","citation":{"mla":"Koch, Thorsten, et al. “Integrating Security Protocols in Scenario-Based Requirements Specifications.” <i>Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development</i>, SCITEPRESS - Science and Technology Publications, 2022, doi:<a href=\"https://doi.org/10.5220/0010783300003119\">10.5220/0010783300003119</a>.","short":"T. Koch, S. Trippel, S. Dziwok, E. Bodden, in: Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development, SCITEPRESS - Science and Technology Publications, 2022.","bibtex":"@inproceedings{Koch_Trippel_Dziwok_Bodden_2022, title={Integrating Security Protocols in Scenario-based Requirements Specifications}, DOI={<a href=\"https://doi.org/10.5220/0010783300003119\">10.5220/0010783300003119</a>}, booktitle={Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development}, publisher={SCITEPRESS - Science and Technology Publications}, author={Koch, Thorsten and Trippel, Sascha and Dziwok, Stefan and Bodden, Eric}, year={2022} }","apa":"Koch, T., Trippel, S., Dziwok, S., &#38; Bodden, E. (2022). Integrating Security Protocols in Scenario-based Requirements Specifications. <i>Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development</i>. <a href=\"https://doi.org/10.5220/0010783300003119\">https://doi.org/10.5220/0010783300003119</a>","ieee":"T. Koch, S. Trippel, S. Dziwok, and E. Bodden, “Integrating Security Protocols in Scenario-based Requirements Specifications,” 2022, doi: <a href=\"https://doi.org/10.5220/0010783300003119\">10.5220/0010783300003119</a>.","chicago":"Koch, Thorsten, Sascha Trippel, Stefan Dziwok, and Eric Bodden. “Integrating Security Protocols in Scenario-Based Requirements Specifications.” In <i>Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development</i>. SCITEPRESS - Science and Technology Publications, 2022. <a href=\"https://doi.org/10.5220/0010783300003119\">https://doi.org/10.5220/0010783300003119</a>.","ama":"Koch T, Trippel S, Dziwok S, Bodden E. Integrating Security Protocols in Scenario-based Requirements Specifications. In: <i>Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development</i>. SCITEPRESS - Science and Technology Publications; 2022. doi:<a href=\"https://doi.org/10.5220/0010783300003119\">10.5220/0010783300003119</a>"},"year":"2022","publication_status":"published","doi":"10.5220/0010783300003119","title":"Integrating Security Protocols in Scenario-based Requirements Specifications","date_created":"2022-02-15T07:47:51Z","author":[{"first_name":"Thorsten","last_name":"Koch","id":"13616","full_name":"Koch, Thorsten"},{"first_name":"Sascha","full_name":"Trippel, Sascha","last_name":"Trippel"},{"first_name":"Stefan","full_name":"Dziwok, Stefan","id":"3901","last_name":"Dziwok","orcid":"http://orcid.org/0000-0002-8679-6673"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric"}],"date_updated":"2022-02-15T07:48:53Z","publisher":"SCITEPRESS - Science and Technology Publications"},{"status":"public","type":"conference","language":[{"iso":"eng"}],"_id":"33837","series_title":"IEEE Secure Development Conference (SecDev)","user_id":"15249","department":[{"_id":"76"},{"_id":"662"}],"year":"2022","citation":{"apa":"Piskachev, G., Dziwok, S., Koch, T., Merschjohann, S., &#38; Bodden, E. (2022). <i>How far are German companies in improving security through static program analysis tools?</i>","short":"G. Piskachev, S. Dziwok, T. Koch, S. Merschjohann, E. Bodden, (2022).","bibtex":"@article{Piskachev_Dziwok_Koch_Merschjohann_Bodden_2022, series={IEEE Secure Development Conference (SecDev)}, title={How far are German companies in improving security through static program analysis tools?}, author={Piskachev, Goran and Dziwok, Stefan and Koch, Thorsten and Merschjohann, Sven and Bodden, Eric}, year={2022}, collection={IEEE Secure Development Conference (SecDev)} }","mla":"Piskachev, Goran, et al. <i>How Far Are German Companies in Improving Security through Static Program Analysis Tools?</i> 2022.","chicago":"Piskachev, Goran, Stefan Dziwok, Thorsten Koch, Sven Merschjohann, and Eric Bodden. “How Far Are German Companies in Improving Security through Static Program Analysis Tools?” IEEE Secure Development Conference (SecDev), 2022.","ieee":"G. Piskachev, S. Dziwok, T. Koch, S. Merschjohann, and E. Bodden, “How far are German companies in improving security through static program analysis tools?” 2022.","ama":"Piskachev G, Dziwok S, Koch T, Merschjohann S, Bodden E. How far are German companies in improving security through static program analysis tools? Published online 2022."},"title":"How far are German companies in improving security through static program analysis tools?","date_updated":"2022-10-20T12:37:44Z","date_created":"2022-10-20T12:37:14Z","author":[{"first_name":"Goran","last_name":"Piskachev","orcid":"0000-0003-4424-5838","id":"41936","full_name":"Piskachev, Goran"},{"id":"3901","full_name":"Dziwok, Stefan","orcid":"http://orcid.org/0000-0002-8679-6673","last_name":"Dziwok","first_name":"Stefan"},{"first_name":"Thorsten","full_name":"Koch, Thorsten","id":"13616","last_name":"Koch"},{"first_name":"Sven","last_name":"Merschjohann","id":"11394","full_name":"Merschjohann, Sven"},{"last_name":"Bodden","orcid":"0000-0003-3470-3647","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"}]},{"status":"public","abstract":[{"lang":"eng","text":"In recent years, the World Economic Forum has identified software security as\r\nthe most significant technological risk to the world's population, as\r\nsoftware-intensive systems process critical data and provide critical services.\r\nThis raises the question of the extent to which German companies are addressing\r\nsoftware security in developing and operating their software products. This\r\npaper reports on the results of an extensive study among developers, product\r\nowners, and managers to answer this question. Our results show that ensuring\r\nsecurity is a multi-faceted challenge for companies, involving low awareness,\r\ninaccurate self-assessment, and a lack of competence on the topic of secure\r\nsoftware development among all stakeholders. The current situation in software\r\ndevelopment is therefore detrimental to the security of software products in\r\nthe medium and long term."}],"type":"preprint","publication":"arXiv:2108.11752","language":[{"iso":"eng"}],"user_id":"13616","department":[{"_id":"241"},{"_id":"662"}],"_id":"23534","citation":{"ieee":"S. Dziwok, T. Koch, S. Merschjohann, B. Budweg, and S. Leuer, “AppSecure.nrw Software Security Study,” <i>arXiv:2108.11752</i>. 2021.","chicago":"Dziwok, Stefan, Thorsten Koch, Sven Merschjohann, Boris Budweg, and Sebastian Leuer. “AppSecure.Nrw Software Security Study.” <i>ArXiv:2108.11752</i>, 2021.","ama":"Dziwok S, Koch T, Merschjohann S, Budweg B, Leuer S. AppSecure.nrw Software Security Study. <i>arXiv:210811752</i>. 2021.","short":"S. Dziwok, T. Koch, S. Merschjohann, B. Budweg, S. Leuer, ArXiv:2108.11752 (2021).","bibtex":"@article{Dziwok_Koch_Merschjohann_Budweg_Leuer_2021, title={AppSecure.nrw Software Security Study}, journal={arXiv:2108.11752}, author={Dziwok, Stefan and Koch, Thorsten and Merschjohann, Sven and Budweg, Boris and Leuer, Sebastian}, year={2021} }","mla":"Dziwok, Stefan, et al. “AppSecure.Nrw Software Security Study.” <i>ArXiv:2108.11752</i>, 2021.","apa":"Dziwok, S., Koch, T., Merschjohann, S., Budweg, B., &#38; Leuer, S. (2021). AppSecure.nrw Software Security Study. <i>ArXiv:2108.11752</i>."},"year":"2021","title":"AppSecure.nrw Software Security Study","author":[{"id":"3901","full_name":"Dziwok, Stefan","last_name":"Dziwok","orcid":"http://orcid.org/0000-0002-8679-6673","first_name":"Stefan"},{"first_name":"Thorsten","id":"13616","full_name":"Koch, Thorsten","last_name":"Koch"},{"first_name":"Sven","full_name":"Merschjohann, Sven","id":"11394","last_name":"Merschjohann"},{"last_name":"Budweg","full_name":"Budweg, Boris","first_name":"Boris"},{"last_name":"Leuer","full_name":"Leuer, Sebastian","first_name":"Sebastian"}],"date_created":"2021-08-27T04:57:00Z","date_updated":"2022-01-06T06:55:56Z"},{"citation":{"ama":"Koch T, Dziwok S, Holtmann J, Bodden E. Scenario-based Specification of Security Protocols and Transformation to Security Model Checkers. In: <i>ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20)</i>. ACM; 2020. doi:<a href=\"https://doi.org/10.1145/3365438.3410946\">10.1145/3365438.3410946</a>","chicago":"Koch, Thorsten, Stefan Dziwok, Jörg Holtmann, and Eric Bodden. “Scenario-Based Specification of Security Protocols and Transformation to Security Model Checkers.” In <i>ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20)</i>. ACM, 2020. <a href=\"https://doi.org/10.1145/3365438.3410946\">https://doi.org/10.1145/3365438.3410946</a>.","ieee":"T. Koch, S. Dziwok, J. Holtmann, and E. Bodden, “Scenario-based Specification of Security Protocols and Transformation to Security Model Checkers,” 2020, doi: <a href=\"https://doi.org/10.1145/3365438.3410946\">10.1145/3365438.3410946</a>.","mla":"Koch, Thorsten, et al. “Scenario-Based Specification of Security Protocols and Transformation to Security Model Checkers.” <i>ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20)</i>, ACM, 2020, doi:<a href=\"https://doi.org/10.1145/3365438.3410946\">10.1145/3365438.3410946</a>.","bibtex":"@inproceedings{Koch_Dziwok_Holtmann_Bodden_2020, title={Scenario-based Specification of Security Protocols and Transformation to Security Model Checkers}, DOI={<a href=\"https://doi.org/10.1145/3365438.3410946\">10.1145/3365438.3410946</a>}, booktitle={ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20)}, publisher={ACM}, author={Koch, Thorsten and Dziwok, Stefan and Holtmann, Jörg and Bodden, Eric}, year={2020} }","short":"T. Koch, S. Dziwok, J. Holtmann, E. Bodden, in: ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20), ACM, 2020.","apa":"Koch, T., Dziwok, S., Holtmann, J., &#38; Bodden, E. (2020). Scenario-based Specification of Security Protocols and Transformation to Security Model Checkers. <i>ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20)</i>. <a href=\"https://doi.org/10.1145/3365438.3410946\">https://doi.org/10.1145/3365438.3410946</a>"},"year":"2020","doi":"10.1145/3365438.3410946","title":"Scenario-based Specification of Security Protocols and Transformation to Security Model Checkers","author":[{"full_name":"Koch, Thorsten","id":"13616","last_name":"Koch","first_name":"Thorsten"},{"first_name":"Stefan","full_name":"Dziwok, Stefan","id":"3901","orcid":"http://orcid.org/0000-0002-8679-6673","last_name":"Dziwok"},{"first_name":"Jörg","orcid":"0000-0001-6141-4571","last_name":"Holtmann","full_name":"Holtmann, Jörg","id":"3875"},{"first_name":"Eric","id":"59256","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden"}],"date_created":"2020-11-26T10:19:54Z","date_updated":"2022-01-06T06:54:29Z","publisher":"ACM","status":"public","publication":"ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20)","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"76"},{"_id":"241"},{"_id":"662"}],"user_id":"5786","_id":"20518"},{"_id":"21931","series_title":"Lecture Notes in Informatics (LNI)","user_id":"13616","department":[{"_id":"241"},{"_id":"662"}],"language":[{"iso":"eng"}],"type":"conference","publication":"Software Engineering 2020 (SE 2020)","editor":[{"last_name":"Felderer","full_name":"Felderer, Michael","first_name":"Michael"},{"first_name":"Wilhelm","full_name":"Hasselbring, Wilhelm","last_name":"Hasselbring"},{"first_name":"Rick","full_name":"Rabiser, Rick","last_name":"Rabiser"},{"last_name":"Jung","full_name":"Jung, Reiner","first_name":"Reiner"}],"status":"public","publisher":"Gesellschaft für Informatik e.V.","date_updated":"2022-01-06T06:55:19Z","author":[{"last_name":"Koch","id":"13616","full_name":"Koch, Thorsten","first_name":"Thorsten"},{"full_name":"Meyer, Matthias","id":"683","last_name":"Meyer","first_name":"Matthias"},{"last_name":"Fazal-Baqaie","full_name":"Fazal-Baqaie, Masud","first_name":"Masud"},{"last_name":"Runschke","full_name":"Runschke, Hubert","first_name":"Hubert"}],"date_created":"2021-04-30T11:15:13Z","title":"Softwareentwicklung wie am Fliessband","doi":"10.18420/SE2020\\_58","year":"2020","citation":{"chicago":"Koch, Thorsten, Matthias Meyer, Masud Fazal-Baqaie, and Hubert Runschke. “Softwareentwicklung Wie Am Fliessband.” In <i>Software Engineering 2020 (SE 2020)</i>, edited by Michael Felderer, Wilhelm Hasselbring, Rick Rabiser, and Reiner Jung. Lecture Notes in Informatics (LNI). Gesellschaft für Informatik e.V., 2020. <a href=\"https://doi.org/10.18420/SE2020\\_58\">https://doi.org/10.18420/SE2020\\_58</a>.","ieee":"T. Koch, M. Meyer, M. Fazal-Baqaie, and H. Runschke, “Softwareentwicklung wie am Fliessband,” in <i>Software Engineering 2020 (SE 2020)</i>, 2020.","ama":"Koch T, Meyer M, Fazal-Baqaie M, Runschke H. Softwareentwicklung wie am Fliessband. In: Felderer M, Hasselbring W, Rabiser R, Jung R, eds. <i>Software Engineering 2020 (SE 2020)</i>. Lecture Notes in Informatics (LNI). Gesellschaft für Informatik e.V.; 2020. doi:<a href=\"https://doi.org/10.18420/SE2020\\_58\">10.18420/SE2020\\_58</a>","mla":"Koch, Thorsten, et al. “Softwareentwicklung Wie Am Fliessband.” <i>Software Engineering 2020 (SE 2020)</i>, edited by Michael Felderer et al., Gesellschaft für Informatik e.V., 2020, doi:<a href=\"https://doi.org/10.18420/SE2020\\_58\">10.18420/SE2020\\_58</a>.","bibtex":"@inproceedings{Koch_Meyer_Fazal-Baqaie_Runschke_2020, series={Lecture Notes in Informatics (LNI)}, title={Softwareentwicklung wie am Fliessband}, DOI={<a href=\"https://doi.org/10.18420/SE2020\\_58\">10.18420/SE2020\\_58</a>}, booktitle={Software Engineering 2020 (SE 2020)}, publisher={Gesellschaft für Informatik e.V.}, author={Koch, Thorsten and Meyer, Matthias and Fazal-Baqaie, Masud and Runschke, Hubert}, editor={Felderer, Michael and Hasselbring, Wilhelm and Rabiser, Rick and Jung, ReinerEditors}, year={2020}, collection={Lecture Notes in Informatics (LNI)} }","short":"T. Koch, M. Meyer, M. Fazal-Baqaie, H. Runschke, in: M. Felderer, W. Hasselbring, R. Rabiser, R. Jung (Eds.), Software Engineering 2020 (SE 2020), Gesellschaft für Informatik e.V., 2020.","apa":"Koch, T., Meyer, M., Fazal-Baqaie, M., &#38; Runschke, H. (2020). Softwareentwicklung wie am Fliessband. In M. Felderer, W. Hasselbring, R. Rabiser, &#38; R. Jung (Eds.), <i>Software Engineering 2020 (SE 2020)</i>. Gesellschaft für Informatik e.V. <a href=\"https://doi.org/10.18420/SE2020\\_58\">https://doi.org/10.18420/SE2020\\_58</a>"}},{"year":"2019","citation":{"mla":"Altemeier, Katharina, et al. “Was Fehlt (Bisher) Um Apps Sicher Zu Entwickeln? - Prozesse, Werkzeuge Und Schulungen Für Sichere Apps by Design.” <i>Projektmanagement Und Vorgehensmodelle 2019 (PVM 2019)</i>, edited by Martin Mikusz, Gesellschaft für Informatik e.V., 2019.","bibtex":"@inproceedings{Altemeier_Becker_Dziwok_Koch_Merschjohann_2019, series={Lecture Notes in Informatics (LNI)}, title={Was fehlt (bisher) um Apps sicher zu entwickeln? - Prozesse, Werkzeuge und Schulungen für sichere Apps by Design}, booktitle={Projektmanagement und Vorgehensmodelle 2019 (PVM 2019)}, publisher={Gesellschaft für Informatik e.V.}, author={Altemeier, Katharina and Becker, Matthias and Dziwok, Stefan and Koch, Thorsten and Merschjohann, Sven}, editor={Mikusz, MartinEditor}, year={2019}, collection={Lecture Notes in Informatics (LNI)} }","short":"K. Altemeier, M. Becker, S. Dziwok, T. Koch, S. Merschjohann, in: M. Mikusz (Ed.), Projektmanagement Und Vorgehensmodelle 2019 (PVM 2019), Gesellschaft für Informatik e.V., 2019.","apa":"Altemeier, K., Becker, M., Dziwok, S., Koch, T., &#38; Merschjohann, S. (2019). Was fehlt (bisher) um Apps sicher zu entwickeln? - Prozesse, Werkzeuge und Schulungen für sichere Apps by Design. In M. Mikusz (Ed.), <i>Projektmanagement und Vorgehensmodelle 2019 (PVM 2019)</i>. Gesellschaft für Informatik e.V.","ama":"Altemeier K, Becker M, Dziwok S, Koch T, Merschjohann S. Was fehlt (bisher) um Apps sicher zu entwickeln? - Prozesse, Werkzeuge und Schulungen für sichere Apps by Design. In: Mikusz M, ed. <i>Projektmanagement Und Vorgehensmodelle 2019 (PVM 2019)</i>. Lecture Notes in Informatics (LNI). Gesellschaft für Informatik e.V.; 2019.","ieee":"K. Altemeier, M. Becker, S. Dziwok, T. Koch, and S. Merschjohann, “Was fehlt (bisher) um Apps sicher zu entwickeln? - Prozesse, Werkzeuge und Schulungen für sichere Apps by Design,” in <i>Projektmanagement und Vorgehensmodelle 2019 (PVM 2019)</i>, 2019.","chicago":"Altemeier, Katharina, Matthias Becker, Stefan Dziwok, Thorsten Koch, and Sven Merschjohann. “Was Fehlt (Bisher) Um Apps Sicher Zu Entwickeln? - Prozesse, Werkzeuge Und Schulungen Für Sichere Apps by Design.” In <i>Projektmanagement Und Vorgehensmodelle 2019 (PVM 2019)</i>, edited by Martin Mikusz. Lecture Notes in Informatics (LNI). Gesellschaft für Informatik e.V., 2019."},"title":"Was fehlt (bisher) um Apps sicher zu entwickeln? - Prozesse, Werkzeuge und Schulungen für sichere Apps by Design","publisher":"Gesellschaft für Informatik e.V.","date_updated":"2022-01-06T06:55:19Z","author":[{"first_name":"Katharina","last_name":"Altemeier","full_name":"Altemeier, Katharina"},{"first_name":"Matthias","full_name":"Becker, Matthias","last_name":"Becker"},{"id":"3901","full_name":"Dziwok, Stefan","last_name":"Dziwok","orcid":"http://orcid.org/0000-0002-8679-6673","first_name":"Stefan"},{"id":"13616","full_name":"Koch, Thorsten","last_name":"Koch","first_name":"Thorsten"},{"first_name":"Sven","last_name":"Merschjohann","id":"11394","full_name":"Merschjohann, Sven"}],"date_created":"2021-04-30T10:55:34Z","editor":[{"first_name":"Martin","full_name":"Mikusz, Martin","last_name":"Mikusz"}],"status":"public","publication":"Projektmanagement und Vorgehensmodelle 2019 (PVM 2019)","type":"conference","language":[{"iso":"eng"}],"_id":"21929","department":[{"_id":"241"},{"_id":"662"}],"user_id":"13616","series_title":"Lecture Notes in Informatics (LNI)"},{"intvolume":"       880","page":"173-197","citation":{"ieee":"T. Koch, J. Holtmann, and T. Lindemann, “Model-Driven STEP Application Protocol Extensions Combined with Feature Modeling Considering Geometrical Information,” in <i>Revised Selected Papers of the 5th International Conference on Model-Driven Engineering and Software Development</i>, vol. 880, L. F. Pires, S. Hammoudi, and B. Selic, Eds. Springer International Publishing, 2018, pp. 173–197.","chicago":"Koch, Thorsten, Jörg Holtmann, and Timo Lindemann. “Model-Driven STEP Application Protocol Extensions Combined with Feature Modeling Considering Geometrical Information.” In <i>Revised Selected Papers of the 5th International Conference on Model-Driven Engineering and Software Development</i>, edited by Luís Ferreira Pires, Slimane Hammoudi, and Bran Selic, 880:173–97. Communications in Computer and Information Science. Springer International Publishing, 2018. <a href=\"https://doi.org/10.1007/978-3-319-94764-8_8\">https://doi.org/10.1007/978-3-319-94764-8_8</a>.","ama":"Koch T, Holtmann J, Lindemann T. Model-Driven STEP Application Protocol Extensions Combined with Feature Modeling Considering Geometrical Information. In: Pires LF, Hammoudi S, Selic B, eds. <i>Revised Selected Papers of the 5th International Conference on Model-Driven Engineering and Software Development</i>. Vol 880. Communications in Computer and Information Science. Springer International Publishing; 2018:173-197. doi:<a href=\"https://doi.org/10.1007/978-3-319-94764-8_8\">10.1007/978-3-319-94764-8_8</a>","bibtex":"@inbook{Koch_Holtmann_Lindemann_2018, series={Communications in Computer and Information Science}, title={Model-Driven STEP Application Protocol Extensions Combined with Feature Modeling Considering Geometrical Information}, volume={880}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-94764-8_8\">10.1007/978-3-319-94764-8_8</a>}, booktitle={Revised Selected Papers of the 5th International Conference on Model-Driven Engineering and Software Development}, publisher={Springer International Publishing}, author={Koch, Thorsten and Holtmann, Jörg and Lindemann, Timo}, editor={Pires, Luís Ferreira and Hammoudi, Slimane and Selic, BranEditors}, year={2018}, pages={173–197}, collection={Communications in Computer and Information Science} }","mla":"Koch, Thorsten, et al. “Model-Driven STEP Application Protocol Extensions Combined with Feature Modeling Considering Geometrical Information.” <i>Revised Selected Papers of the 5th International Conference on Model-Driven Engineering and Software Development</i>, edited by Luís Ferreira Pires et al., vol. 880, Springer International Publishing, 2018, pp. 173–97, doi:<a href=\"https://doi.org/10.1007/978-3-319-94764-8_8\">10.1007/978-3-319-94764-8_8</a>.","short":"T. Koch, J. Holtmann, T. Lindemann, in: L.F. Pires, S. Hammoudi, B. Selic (Eds.), Revised Selected Papers of the 5th International Conference on Model-Driven Engineering and Software Development, Springer International Publishing, 2018, pp. 173–197.","apa":"Koch, T., Holtmann, J., &#38; Lindemann, T. (2018). Model-Driven STEP Application Protocol Extensions Combined with Feature Modeling Considering Geometrical Information. In L. F. Pires, S. Hammoudi, &#38; B. Selic (Eds.), <i>Revised Selected Papers of the 5th International Conference on Model-Driven Engineering and Software Development</i> (Vol. 880, pp. 173–197). Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-94764-8_8\">https://doi.org/10.1007/978-3-319-94764-8_8</a>"},"year":"2018","volume":880,"date_created":"2020-12-17T12:03:28Z","author":[{"id":"13616","full_name":"Koch, Thorsten","last_name":"Koch","first_name":"Thorsten"},{"id":"3875","full_name":"Holtmann, Jörg","last_name":"Holtmann","orcid":"0000-0001-6141-4571","first_name":"Jörg"},{"first_name":"Timo","last_name":"Lindemann","full_name":"Lindemann, Timo"}],"date_updated":"2022-01-06T06:54:38Z","publisher":"Springer International Publishing","doi":"10.1007/978-3-319-94764-8_8","title":"Model-Driven STEP Application Protocol Extensions Combined with Feature Modeling Considering Geometrical Information","publication":"Revised Selected Papers of the 5th International Conference on Model-Driven Engineering and Software Development","type":"book_chapter","status":"public","abstract":[{"lang":"eng","text":"Original equipment manufacturers (OEMs) build mechatronic, variant-rich systems using components from several suppliers in industry sectors like automation. The OEMs have to integrate the different components to the overall system based on a virtual layout. For this purpose, the suppliers provide geometrical information via the standardized exchange format STEP. Beyond the geometrical information, the OEMs need additional logical and technical information for the integration task as well as the variant handling. For that reason, STEP provides an extension mechanism for extending and tailoring STEP to project-specific needs. However, extending STEP requires extending several capabilities of all involved tools, which prevents the project-specific utilization of the STEP extensions mechanism. In order to cope with this problem, we presented in previous work a model-driven approach enabling the flexible specification of STEP extensions and particularly the automatic derivation of the required capability extensions for two involved tools. Nevertheless, the OEMs still need to apply several engineering tools from different domains to consider logical as well as geometrical constraints between product variants. In this paper, we hence combine our previous approach with extended feature models that consider conventional logical and particularly geometrical information, thereby enabling a holistic product line engineering for mechatronic systems. By means of an automation production system example, we illustrate how OEMs can orchestrate their overall supply and development processes through the combination of both approaches."}],"editor":[{"full_name":"Pires, Luís Ferreira","last_name":"Pires","first_name":"Luís Ferreira"},{"last_name":"Hammoudi","full_name":"Hammoudi, Slimane","first_name":"Slimane"},{"first_name":"Bran","last_name":"Selic","full_name":"Selic, Bran"}],"department":[{"_id":"241"},{"_id":"662"}],"series_title":"Communications in Computer and Information Science","user_id":"13616","_id":"20782","language":[{"iso":"eng"}]},{"date_updated":"2022-01-06T06:54:38Z","date_created":"2020-12-17T12:05:35Z","author":[{"id":"13616","full_name":"Koch, Thorsten","last_name":"Koch","first_name":"Thorsten"}],"title":"Towards Scenario-based Security Requirements Engineering for Cyber-Physical Systems","year":"2018","citation":{"chicago":"Koch, Thorsten. “Towards Scenario-Based Security Requirements Engineering for Cyber-Physical Systems.” In <i>International Workshop on Security for and by Model-Driven Engineering (SecureMDE 2018)</i>, 2018.","ieee":"T. Koch, “Towards Scenario-based Security Requirements Engineering for Cyber-Physical Systems,” in <i>International Workshop on Security for and by Model-Driven Engineering (SecureMDE 2018)</i>, 2018.","ama":"Koch T. Towards Scenario-based Security Requirements Engineering for Cyber-Physical Systems. In: <i>International Workshop on Security for and by Model-Driven Engineering (SecureMDE 2018)</i>. ; 2018.","short":"T. Koch, in: International Workshop on Security for and by Model-Driven Engineering (SecureMDE 2018), 2018.","bibtex":"@inproceedings{Koch_2018, title={Towards Scenario-based Security Requirements Engineering for Cyber-Physical Systems}, booktitle={International Workshop on Security for and by Model-Driven Engineering (SecureMDE 2018)}, author={Koch, Thorsten}, year={2018} }","mla":"Koch, Thorsten. “Towards Scenario-Based Security Requirements Engineering for Cyber-Physical Systems.” <i>International Workshop on Security for and by Model-Driven Engineering (SecureMDE 2018)</i>, 2018.","apa":"Koch, T. (2018). Towards Scenario-based Security Requirements Engineering for Cyber-Physical Systems. In <i>International Workshop on Security for and by Model-Driven Engineering (SecureMDE 2018)</i>."},"_id":"20783","user_id":"13616","department":[{"_id":"241"},{"_id":"662"}],"language":[{"iso":"eng"}],"type":"conference","publication":"International Workshop on Security for and by Model-Driven Engineering (SecureMDE 2018)","status":"public"},{"_id":"20786","user_id":"8472","department":[{"_id":"241"},{"_id":"662"}],"language":[{"iso":"eng"}],"type":"conference","publication":"6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018)","abstract":[{"lang":"eng","text":"Distributed, software-intensive systems such as automotive electronic control units have to handle various situations employing message-based coordination. The growing complexity of such systems results in an increasing difficulty to achieve a high quality of the systems' requirements specifications. Scenario-based requirements engineering addresses the message-based coordination of such systems and enables, if underpinned with formal modeling languages, automatic analyses for ensuring the quality of requirements specifications. However, formal requirements modeling languages require high expertise of the requirements engineers and many manual iterations until specifications reach high quality. Patterns provide a constructive means for assembling high-quality solutions by applying reusable and established building blocks. Thus, they also gained momentum in requirements documentation. In order to support the requirements engineers in the systematic conception of formal, scenario-based requirements specification models, we hence introduce in this paper a requirement pattern catalog for a requirements modeling language. We illustrate and discuss the application of the requirement patterns with an example of requirements for an automotive electronic control unit."}],"status":"public","date_updated":"2022-01-06T06:54:38Z","date_created":"2020-12-17T12:12:20Z","author":[{"id":"8472","full_name":"Fockel, Markus","last_name":"Fockel","orcid":"0000-0002-1269-0702","first_name":"Markus"},{"last_name":"Holtmann","orcid":"0000-0001-6141-4571","full_name":"Holtmann, Jörg","id":"3875","first_name":"Jörg"},{"last_name":"Koch","full_name":"Koch, Thorsten","id":"13616","first_name":"Thorsten"},{"first_name":"David","last_name":"Schmelter","orcid":"0000-0001-7787-5380","full_name":"Schmelter, David","id":"40982"}],"title":"Formal, Model- and Scenario-based Requirement Patterns","year":"2018","citation":{"bibtex":"@inproceedings{Fockel_Holtmann_Koch_Schmelter_2018, title={Formal, Model- and Scenario-based Requirement Patterns}, booktitle={6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018)}, author={Fockel, Markus and Holtmann, Jörg and Koch, Thorsten and Schmelter, David}, year={2018} }","short":"M. Fockel, J. Holtmann, T. Koch, D. Schmelter, in: 6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018), 2018.","mla":"Fockel, Markus, et al. “Formal, Model- and Scenario-Based Requirement Patterns.” <i>6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018)</i>, 2018.","apa":"Fockel, M., Holtmann, J., Koch, T., &#38; Schmelter, D. (2018). Formal, Model- and Scenario-based Requirement Patterns. In <i>6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018)</i>.","ama":"Fockel M, Holtmann J, Koch T, Schmelter D. Formal, Model- and Scenario-based Requirement Patterns. In: <i>6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018)</i>. ; 2018.","ieee":"M. Fockel, J. Holtmann, T. Koch, and D. Schmelter, “Formal, Model- and Scenario-based Requirement Patterns,” in <i>6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018)</i>, 2018.","chicago":"Fockel, Markus, Jörg Holtmann, Thorsten Koch, and David Schmelter. “Formal, Model- and Scenario-Based Requirement Patterns.” In <i>6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018)</i>, 2018."}},{"report_number":"tr-ri-17-354","type":"report","status":"public","abstract":[{"text":"Scenario-based requirements engineering addresses the message-based coordination of software-intensive systems and enables, if underpinned with formal languages, automatic requirements validation techniques for improving the quality of a requirements specification. One of such requirements engineering approaches bases on a recent visual Live Sequence Chart variant compliant to the Unified Modeling Language, so-called Modal Sequence Diagrams (MSDs). The usage of patterns is known to be constructive thanks to assembling solutions by means of reusable building blocks that are proven in practice, so that recurring problems do not need to be solved over and over again. Thus, patterns also gained momentum in the area of requirements documentation. In this technical report, we introduce a model- and scenario-based pattern catalog for MSD requirements. Our MSD requirement pattern catalog consolidates and unifies 86 requirement patterns from three well-known, practice-oriented requirement pattern catalogs, each covering different aspects.","lang":"eng"}],"user_id":"8472","department":[{"_id":"241"},{"_id":"662"}],"_id":"20793","language":[{"iso":"eng"}],"citation":{"ama":"Fockel M, Holtmann J, Koch T, Schmelter D. <i>Model-Based Requirement Pattern Catalog</i>. Paderborn, Germany; 2017.","ieee":"M. Fockel, J. Holtmann, T. Koch, and D. Schmelter, <i>Model-based Requirement Pattern Catalog</i>. Paderborn, Germany, 2017.","chicago":"Fockel, Markus, Jörg Holtmann, Thorsten Koch, and David Schmelter. <i>Model-Based Requirement Pattern Catalog</i>. Paderborn, Germany, 2017.","apa":"Fockel, M., Holtmann, J., Koch, T., &#38; Schmelter, D. (2017). <i>Model-based Requirement Pattern Catalog</i>. Paderborn, Germany.","short":"M. Fockel, J. Holtmann, T. Koch, D. Schmelter, Model-Based Requirement Pattern Catalog, Paderborn, Germany, 2017.","bibtex":"@book{Fockel_Holtmann_Koch_Schmelter_2017, place={Paderborn, Germany}, title={Model-based Requirement Pattern Catalog}, author={Fockel, Markus and Holtmann, Jörg and Koch, Thorsten and Schmelter, David}, year={2017} }","mla":"Fockel, Markus, et al. <i>Model-Based Requirement Pattern Catalog</i>. 2017."},"year":"2017","place":"Paderborn, Germany","date_created":"2020-12-17T13:31:36Z","author":[{"first_name":"Markus","id":"8472","full_name":"Fockel, Markus","orcid":"0000-0002-1269-0702","last_name":"Fockel"},{"full_name":"Holtmann, Jörg","id":"3875","orcid":"0000-0001-6141-4571","last_name":"Holtmann","first_name":"Jörg"},{"full_name":"Koch, Thorsten","id":"13616","last_name":"Koch","first_name":"Thorsten"},{"last_name":"Schmelter","orcid":"0000-0001-7787-5380","full_name":"Schmelter, David","id":"40982","first_name":"David"}],"date_updated":"2022-01-06T06:54:38Z","title":"Model-based Requirement Pattern Catalog"},{"date_updated":"2022-01-06T06:54:39Z","date_created":"2020-12-17T13:51:04Z","author":[{"full_name":"Koch, Thorsten","id":"13616","last_name":"Koch","first_name":"Thorsten"},{"first_name":"Jörg","full_name":"Holtmann, Jörg","id":"3875","last_name":"Holtmann","orcid":"0000-0001-6141-4571"},{"first_name":"Timo","full_name":"Lindemann, Timo","last_name":"Lindemann"}],"title":"Flexible Specification of STEP Application Protocol Extensions and Automatic Derivation of Tool Capabilities","doi":"10.5220/0006137400530064","year":"2017","citation":{"ieee":"T. Koch, J. Holtmann, and T. Lindemann, “Flexible Specification of STEP Application Protocol Extensions and Automatic Derivation of Tool Capabilities,” in <i>Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development</i>, 2017.","chicago":"Koch, Thorsten, Jörg Holtmann, and Timo Lindemann. “Flexible Specification of STEP Application Protocol Extensions and Automatic Derivation of Tool Capabilities.” In <i>Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development</i>, 2017. <a href=\"https://doi.org/10.5220/0006137400530064\">https://doi.org/10.5220/0006137400530064</a>.","ama":"Koch T, Holtmann J, Lindemann T. Flexible Specification of STEP Application Protocol Extensions and Automatic Derivation of Tool Capabilities. In: <i>Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development</i>. ; 2017. doi:<a href=\"https://doi.org/10.5220/0006137400530064\">10.5220/0006137400530064</a>","apa":"Koch, T., Holtmann, J., &#38; Lindemann, T. (2017). Flexible Specification of STEP Application Protocol Extensions and Automatic Derivation of Tool Capabilities. In <i>Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development</i>. <a href=\"https://doi.org/10.5220/0006137400530064\">https://doi.org/10.5220/0006137400530064</a>","bibtex":"@inproceedings{Koch_Holtmann_Lindemann_2017, title={Flexible Specification of STEP Application Protocol Extensions and Automatic Derivation of Tool Capabilities}, DOI={<a href=\"https://doi.org/10.5220/0006137400530064\">10.5220/0006137400530064</a>}, booktitle={Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development}, author={Koch, Thorsten and Holtmann, Jörg and Lindemann, Timo}, year={2017} }","mla":"Koch, Thorsten, et al. “Flexible Specification of STEP Application Protocol Extensions and Automatic Derivation of Tool Capabilities.” <i>Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development</i>, 2017, doi:<a href=\"https://doi.org/10.5220/0006137400530064\">10.5220/0006137400530064</a>.","short":"T. Koch, J. Holtmann, T. Lindemann, in: Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017."},"_id":"20801","user_id":"13616","department":[{"_id":"241"},{"_id":"662"}],"language":[{"iso":"eng"}],"type":"conference","publication":"Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development","abstract":[{"lang":"eng","text":"Original equipment manufacturers (OEMs) build mechatronic systems using components from several suppliers in industry sectors like automation. The suppliers provide geometrical information via the standardized exchange format STEP, such that the OEM is able to virtually layout the overall system. Beyond the geometrical information, the OEM needs additional technical information for his development tasks. For that reason, STEP provides an extension mechanism for extending and tailoring STEP to project-specific needs. However, extending STEP moreover requires extending several capabilities of all involved tools, causing high development effort. This effort prevents the project-specific utilization of the STEP extension mechanism and forces the organizations to use awkward workarounds. In order to cope with this problem, we present a model-driven approach enabling the flexible specification of STEP extensions and particularly the automatic derivation of the required further capabilities for two involved tools. We illustrate and evaluate the approach with an automation production system example."}],"status":"public"},{"status":"public","abstract":[{"lang":"eng","text":"In this technical report, we present the MechatronicUML requirements engineering method. The method encompasses a process and a scenario-based modeling language for the documentation and analysis of requirements on the message-based interaction behavior of software-intensive systems. The modeling language uses a scenario notation based on Modal Sequence Diagrams (MSDs), which borrows concepts of UML Interactions as well as of Live Sequence Charts. Furthermore, we introduce the so-called Emergency Braking & Evasion System (EBEAS) as a running example, which is based on current and upcoming real-world driver assistance systems. "}],"type":"report","language":[{"iso":"eng"}],"department":[{"_id":"76"},{"_id":"241"},{"_id":"662"}],"user_id":"5786","_id":"20823","citation":{"bibtex":"@book{Holtmann_Fockel_Koch_Schmelter_Brenner_Bernijazov_Sander_2016, title={The MechatronicUML Requirements Engineering Method: Process and Language}, DOI={<a href=\"https://doi.org/10.13140/RG.2.2.33223.29606\">10.13140/RG.2.2.33223.29606</a>}, author={Holtmann, Jörg and Fockel, Markus and Koch, Thorsten and Schmelter, David and Brenner, Christian and Bernijazov, Ruslan and Sander, Marcel}, year={2016} }","mla":"Holtmann, Jörg, et al. <i>The MechatronicUML Requirements Engineering Method: Process and Language</i>. 2016, doi:<a href=\"https://doi.org/10.13140/RG.2.2.33223.29606\">10.13140/RG.2.2.33223.29606</a>.","short":"J. Holtmann, M. Fockel, T. Koch, D. Schmelter, C. Brenner, R. Bernijazov, M. Sander, The MechatronicUML Requirements Engineering Method: Process and Language, 2016.","apa":"Holtmann, J., Fockel, M., Koch, T., Schmelter, D., Brenner, C., Bernijazov, R., &#38; Sander, M. (2016). <i>The MechatronicUML Requirements Engineering Method: Process and Language</i>. <a href=\"https://doi.org/10.13140/RG.2.2.33223.29606\">https://doi.org/10.13140/RG.2.2.33223.29606</a>","chicago":"Holtmann, Jörg, Markus Fockel, Thorsten Koch, David Schmelter, Christian Brenner, Ruslan Bernijazov, and Marcel Sander. <i>The MechatronicUML Requirements Engineering Method: Process and Language</i>, 2016. <a href=\"https://doi.org/10.13140/RG.2.2.33223.29606\">https://doi.org/10.13140/RG.2.2.33223.29606</a>.","ieee":"J. Holtmann <i>et al.</i>, <i>The MechatronicUML Requirements Engineering Method: Process and Language</i>. 2016.","ama":"Holtmann J, Fockel M, Koch T, et al. <i>The MechatronicUML Requirements Engineering Method: Process and Language</i>.; 2016. doi:<a href=\"https://doi.org/10.13140/RG.2.2.33223.29606\">10.13140/RG.2.2.33223.29606</a>"},"year":"2016","doi":"10.13140/RG.2.2.33223.29606","title":"The MechatronicUML Requirements Engineering Method: Process and Language","date_created":"2020-12-22T09:28:23Z","author":[{"first_name":"Jörg","full_name":"Holtmann, Jörg","id":"3875","orcid":"0000-0001-6141-4571","last_name":"Holtmann"},{"last_name":"Fockel","orcid":"0000-0002-1269-0702","id":"8472","full_name":"Fockel, Markus","first_name":"Markus"},{"full_name":"Koch, Thorsten","id":"13616","last_name":"Koch","first_name":"Thorsten"},{"id":"40982","full_name":"Schmelter, David","last_name":"Schmelter","orcid":"0000-0001-7787-5380","first_name":"David"},{"first_name":"Christian","full_name":"Brenner, Christian","last_name":"Brenner"},{"first_name":"Ruslan","full_name":"Bernijazov, Ruslan","last_name":"Bernijazov"},{"first_name":"Marcel","last_name":"Sander","full_name":"Sander, Marcel"}],"date_updated":"2022-01-06T06:54:40Z"},{"citation":{"apa":"Koch, T., Holtmann, J., Schubert, D., &#38; Lindemann, T. (2016). Towards Feature-based Product Line Engineering of Technical Systems. In A. Trächtler, B. Denkena, &#38; K.-D. Thoben (Eds.), <i>3rd International Conference on System-integrated Intelligence: New Challenges for Product and Production Engineering (SysInt 2016)</i> (pp. 447–454). Elsevier. <a href=\"https://doi.org/10.1016/j.protcy.2016.08.057\">https://doi.org/10.1016/j.protcy.2016.08.057</a>","mla":"Koch, Thorsten, et al. “Towards Feature-Based Product Line Engineering of Technical Systems.” <i>3rd International Conference on System-Integrated Intelligence: New Challenges for Product and Production Engineering (SysInt 2016)</i>, edited by Ansgar Trächtler et al., Elsevier, 2016, pp. 447–54, doi:<a href=\"https://doi.org/10.1016/j.protcy.2016.08.057\">10.1016/j.protcy.2016.08.057</a>.","bibtex":"@inproceedings{Koch_Holtmann_Schubert_Lindemann_2016, title={Towards Feature-based Product Line Engineering of Technical Systems}, DOI={<a href=\"https://doi.org/10.1016/j.protcy.2016.08.057\">10.1016/j.protcy.2016.08.057</a>}, booktitle={3rd International Conference on System-integrated Intelligence: New Challenges for Product and Production Engineering (SysInt 2016)}, publisher={Elsevier}, author={Koch, Thorsten and Holtmann, Jörg and Schubert, David and Lindemann, Timo}, editor={Trächtler, Ansgar and Denkena, Berend and Thoben, Klaus-DieterEditors}, year={2016}, pages={447–454} }","short":"T. Koch, J. Holtmann, D. Schubert, T. Lindemann, in: A. Trächtler, B. Denkena, K.-D. Thoben (Eds.), 3rd International Conference on System-Integrated Intelligence: New Challenges for Product and Production Engineering (SysInt 2016), Elsevier, 2016, pp. 447–454.","chicago":"Koch, Thorsten, Jörg Holtmann, David Schubert, and Timo Lindemann. “Towards Feature-Based Product Line Engineering of Technical Systems.” In <i>3rd International Conference on System-Integrated Intelligence: New Challenges for Product and Production Engineering (SysInt 2016)</i>, edited by Ansgar Trächtler, Berend Denkena, and Klaus-Dieter Thoben, 447–54. Elsevier, 2016. <a href=\"https://doi.org/10.1016/j.protcy.2016.08.057\">https://doi.org/10.1016/j.protcy.2016.08.057</a>.","ieee":"T. Koch, J. Holtmann, D. Schubert, and T. Lindemann, “Towards Feature-based Product Line Engineering of Technical Systems,” in <i>3rd International Conference on System-integrated Intelligence: New Challenges for Product and Production Engineering (SysInt 2016)</i>, 2016, pp. 447–454.","ama":"Koch T, Holtmann J, Schubert D, Lindemann T. Towards Feature-based Product Line Engineering of Technical Systems. In: Trächtler A, Denkena B, Thoben K-D, eds. <i>3rd International Conference on System-Integrated Intelligence: New Challenges for Product and Production Engineering (SysInt 2016)</i>. Elsevier; 2016:447-454. doi:<a href=\"https://doi.org/10.1016/j.protcy.2016.08.057\">10.1016/j.protcy.2016.08.057</a>"},"page":"447-454","year":"2016","author":[{"first_name":"Thorsten","last_name":"Koch","id":"13616","full_name":"Koch, Thorsten"},{"first_name":"Jörg","orcid":"0000-0001-6141-4571","last_name":"Holtmann","full_name":"Holtmann, Jörg","id":"3875"},{"last_name":"Schubert","id":"9106","full_name":"Schubert, David","first_name":"David"},{"full_name":"Lindemann, Timo","last_name":"Lindemann","first_name":"Timo"}],"date_created":"2020-12-22T09:33:36Z","publisher":"Elsevier","date_updated":"2022-01-06T06:54:40Z","doi":"10.1016/j.protcy.2016.08.057","title":"Towards Feature-based Product Line Engineering of Technical Systems","type":"conference","publication":"3rd International Conference on System-integrated Intelligence: New Challenges for Product and Production Engineering (SysInt 2016)","status":"public","abstract":[{"lang":"eng","text":"The development of today’s technical products (e.g., in automation) is characterized by high customer expectations regarding the product individualization, which causes a wide range of product variants. Original equipment manufacturers (OEMs) can apply classical approaches from product line engineering, like feature modeling, to cope with the variability and the induced development complexity. Our tool support for feature models integrates a variety of feature model extensions like feature attributes and properties, logical constraints between features and feature properties, and the distinction between features and feature realizations. Furthermore, technical products have geometrical dimensions. The OEM specifies Computer Aided Design (CAD) models to consider these geometric dimensions and to virtually layout particular product variants. Geometric assembly constraints specify how parts of the product can be arranged in a CAD model. However, a potential product customer cannot configure an individual product variant and virtually layout this variant in the same software tool since the respective information stems from different sources. In order to cope with this problem, we present in this paper an extension of our tool support for feature models to specify geometric assembly constraints. Based on the proposed extension, we outline our research roadmap to consider these constraints in an online shop of an e-commerce system, in which a potential customer shall be able to configure a product variant and to virtually layout it according to the assembly constraints.\r\n"}],"editor":[{"first_name":"Ansgar","full_name":"Trächtler, Ansgar","last_name":"Trächtler"},{"first_name":"Berend","last_name":"Denkena","full_name":"Denkena, Berend"},{"first_name":"Klaus-Dieter","last_name":"Thoben","full_name":"Thoben, Klaus-Dieter"}],"user_id":"13616","department":[{"_id":"241"},{"_id":"662"}],"_id":"20826","language":[{"iso":"eng"}]},{"abstract":[{"lang":"ger","text":"In verschiedenen Unternehmen wird mit Anforderungen unterschiedlich umgegangen. Je nach Größe, Branche und Unternehmenskultur ist das Thema Requirements Engineering (RE) mal weniger, mal mehr etabliert. In einigen Unternehmen wird es als lästige Zusatzaufgabe betrachtet, während andere Unternehmen ganze Abteilungen mit RE als Kernkompetenz betreiben. RE wird allerdings in jedem Projekt - bewusst oder unbewusst - durchgeführt! RE ist die Basis für den weiteren Entwicklungsprozess, die Validierung/Verifikation und die Plan- und Messbarkeit des Projekts. Darüber hinaus können Fehler, die auf Anforderungsebene gefunden werden, weniger aufwendig und somit günstiger behoben werden als in späteren Entwicklungsphasen. Am Fraunhofer IEM beraten wir Unternehmen und erforschen neue Methoden bezüglich der Entwicklung von intelligenten technischen Systemen. In diesem Artikel berichten wir über unsere Erfahrungen aus Projekten, in denen wir Unternehmen aus verschiedenen Branchen und mit unterschiedlichem RE-Reifegrad zwecks Leistungssteigerung des RE begleitet haben. Auf Basis dieser Projekterfahrungen zeigen wir Wege auf, wie der Stand des RE mittels eines Reifegradmodells im eigenen Unternehmen verbessert werden kann."}],"status":"public","publication":"OBJEKTspektrum","type":"journal_article","language":[{"iso":"eng"}],"_id":"20828","department":[{"_id":"241"},{"_id":"662"}],"user_id":"8472","year":"2016","citation":{"ieee":"J. Holtmann, M. Fockel, T. Koch, and D. Schmelter, “Requirements Engineering - Zusatzaufgabe oder Kernkompetenz?,” <i>OBJEKTspektrum</i>, no. RE/2016, 2016.","chicago":"Holtmann, Jörg, Markus Fockel, Thorsten Koch, and David Schmelter. “Requirements Engineering - Zusatzaufgabe Oder Kernkompetenz?” <i>OBJEKTspektrum</i>, no. RE/2016 (2016).","ama":"Holtmann J, Fockel M, Koch T, Schmelter D. Requirements Engineering - Zusatzaufgabe oder Kernkompetenz? <i>OBJEKTspektrum</i>. 2016;(RE/2016).","apa":"Holtmann, J., Fockel, M., Koch, T., &#38; Schmelter, D. (2016). Requirements Engineering - Zusatzaufgabe oder Kernkompetenz? <i>OBJEKTspektrum</i>, (RE/2016).","mla":"Holtmann, Jörg, et al. “Requirements Engineering - Zusatzaufgabe Oder Kernkompetenz?” <i>OBJEKTspektrum</i>, no. RE/2016, 2016.","bibtex":"@article{Holtmann_Fockel_Koch_Schmelter_2016, title={Requirements Engineering - Zusatzaufgabe oder Kernkompetenz?}, number={RE/2016}, journal={OBJEKTspektrum}, author={Holtmann, Jörg and Fockel, Markus and Koch, Thorsten and Schmelter, David}, year={2016} }","short":"J. Holtmann, M. Fockel, T. Koch, D. Schmelter, OBJEKTspektrum (2016)."},"issue":"RE/2016","title":"Requirements Engineering - Zusatzaufgabe oder Kernkompetenz?","main_file_link":[{"url":"http://www.sigs-datacom.de/uploads/tx_dmjournals/fockel_holtmann_koch_schmelter_OTS_RE_16.pdf"}],"date_updated":"2022-01-06T06:54:40Z","author":[{"first_name":"Jörg","last_name":"Holtmann","orcid":"0000-0001-6141-4571","id":"3875","full_name":"Holtmann, Jörg"},{"first_name":"Markus","orcid":"0000-0002-1269-0702","last_name":"Fockel","id":"8472","full_name":"Fockel, Markus"},{"last_name":"Koch","id":"13616","full_name":"Koch, Thorsten","first_name":"Thorsten"},{"orcid":"0000-0001-7787-5380","last_name":"Schmelter","id":"40982","full_name":"Schmelter, David","first_name":"David"}],"date_created":"2020-12-22T09:36:49Z"},{"page":"159–172","intvolume":"       343","citation":{"ama":"Meyer J, Holtmann J, Koch T, Meyer M. Generierung von AUTOSAR-Modellen aus UML-Spezifikationen. In: Gausemeier J, Dumitrescu R, Rammig F-J, Schäfer W, Trächtler A, eds. <i>10. Paderborner Workshop Entwurf Mechatronischer Systeme</i>. Vol 343. Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn. Heinz Nixdorf Institut; 2015:159–172.","ieee":"J. Meyer, J. Holtmann, T. Koch, and M. Meyer, “Generierung von AUTOSAR-Modellen aus UML-Spezifikationen,” in <i>10. Paderborner Workshop Entwurf mechatronischer Systeme</i>, 2015, vol. 343, pp. 159–172.","chicago":"Meyer, Jan, Jörg Holtmann, Thorsten Koch, and Matthias Meyer. “Generierung von AUTOSAR-Modellen Aus UML-Spezifikationen.” In <i>10. Paderborner Workshop Entwurf Mechatronischer Systeme</i>, edited by Jürgen Gausemeier, Roman Dumitrescu, Franz-Josef Rammig, Wilhelm Schäfer, and Ansgar Trächtler, 343:159–172. Verlagsschriftenreihe Des Heinz Nixdorf Instituts, Paderborn. Heinz Nixdorf Institut, 2015.","bibtex":"@inproceedings{Meyer_Holtmann_Koch_Meyer_2015, series={Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn}, title={Generierung von AUTOSAR-Modellen aus UML-Spezifikationen}, volume={343}, booktitle={10. Paderborner Workshop Entwurf mechatronischer Systeme}, publisher={Heinz Nixdorf Institut}, author={Meyer, Jan and Holtmann, Jörg and Koch, Thorsten and Meyer, Matthias}, editor={Gausemeier, Jürgen and Dumitrescu, Roman and Rammig, Franz-Josef and Schäfer, Wilhelm and Trächtler, Ansgar}, year={2015}, pages={159–172}, collection={Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn} }","mla":"Meyer, Jan, et al. “Generierung von AUTOSAR-Modellen Aus UML-Spezifikationen.” <i>10. Paderborner Workshop Entwurf Mechatronischer Systeme</i>, edited by Jürgen Gausemeier et al., vol. 343, Heinz Nixdorf Institut, 2015, pp. 159–172.","short":"J. Meyer, J. Holtmann, T. Koch, M. Meyer, in: J. Gausemeier, R. Dumitrescu, F.-J. Rammig, W. Schäfer, A. Trächtler (Eds.), 10. Paderborner Workshop Entwurf Mechatronischer Systeme, Heinz Nixdorf Institut, 2015, pp. 159–172.","apa":"Meyer, J., Holtmann, J., Koch, T., &#38; Meyer, M. (2015). Generierung von AUTOSAR-Modellen aus UML-Spezifikationen. In J. Gausemeier, R. Dumitrescu, F.-J. Rammig, W. Schäfer, &#38; A. Trächtler (Eds.), <i>10. Paderborner Workshop Entwurf mechatronischer Systeme</i> (Vol. 343, pp. 159–172). Heinz Nixdorf Institut."},"year":"2015","title":"Generierung von AUTOSAR-Modellen aus UML-Spezifikationen","volume":343,"author":[{"full_name":"Meyer, Jan","last_name":"Meyer","first_name":"Jan"},{"first_name":"Jörg","orcid":"0000-0001-6141-4571","last_name":"Holtmann","id":"3875","full_name":"Holtmann, Jörg"},{"id":"13616","full_name":"Koch, Thorsten","last_name":"Koch","first_name":"Thorsten"},{"last_name":"Meyer","id":"683","full_name":"Meyer, Matthias","first_name":"Matthias"}],"date_created":"2021-01-12T13:56:52Z","publisher":"Heinz Nixdorf Institut","date_updated":"2022-01-06T06:54:41Z","status":"public","abstract":[{"text":"Die Komplexität moderner Fahrzeuge steigt aufgrund der zunehmenden Anzahl von Funktionen, die durch elektronische Systeme umgesetzt werden. Insbesondere nehmen die Abhängigkeiten zwischen den an der Entwicklung beteiligten Fachdisziplinen und der Softwareanteil massiv zu. Wir haben einen für die Automobilindustrie angepassten, zum Reifegradmodell Automotive SPICE konformen Prozess für die Entwicklung von Steuergeräten konzipiert, der ein fachdisziplinübergreifendes Systems Engineering und einen systematischen Übergang in die Softwareentwicklung unterstützt. Im Kontext dieses Entwicklungsprozess beschreiben wir in diesem Beitrag den Übergang vom UML-basierten Softwareentwurf zum in der Automobilindustrie etablierten AUTOSAR-Standard mit Hilfe einer automatischen Modelltransformation. So werden fehleranfällige und zeitaufwändige manuelle Tätigkeiten reduziert. Wir haben die Generierung von AUTOSAR-Modellen gemeinsam mit dem international tätigen Automobilzulieferer Hella KGaA Hueck & Co. in seriennahen Entwicklungsprojekten praktisch erprobt und Zeit- und Kostenersparnisse festgestellt.","lang":"ger"}],"editor":[{"first_name":"Jürgen","last_name":"Gausemeier","full_name":"Gausemeier, Jürgen"},{"last_name":"Dumitrescu","full_name":"Dumitrescu, Roman","first_name":"Roman"},{"full_name":"Rammig, Franz-Josef","last_name":"Rammig","first_name":"Franz-Josef"},{"first_name":"Wilhelm","full_name":"Schäfer, Wilhelm","last_name":"Schäfer"},{"first_name":"Ansgar","last_name":"Trächtler","full_name":"Trächtler, Ansgar"}],"publication":"10. Paderborner Workshop Entwurf mechatronischer Systeme","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"76"},{"_id":"241"},{"_id":"662"}],"series_title":"Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn","user_id":"5786","_id":"20902"},{"type":"book_chapter","publication":"Software Architecture","status":"public","abstract":[{"lang":"eng","text":"Real-time software-intensive embedded systems complexity, as in the automotive domain, requires rigorous Requirements Engineering (RE) approaches. Scenario-based RE formalisms like Modal Sequence Diagrams (MSDs) enable an intuitive specication and the simulative validation of functional requirements. However, the dependencies between events occurring in different MSD scenarios are implicit so that it is difficult to find causes of requirements defects, if any. The automotive architecture description language EAST-ADL addresses this problem by relying on event chains, which make dependencies between events explicit. However, EAST-ADL event chains have a low abstraction level, and their relationship to functional requirements has seldom been investigated. Based on the EAST-ADL functional architecture, we propose to use its central notion of event to conciliate both approaches. We conceived an automatic transformation from the high abstraction level requirements specified in MSDs to the low abstraction level event chains.\r\n"}],"user_id":"13616","department":[{"_id":"241"},{"_id":"662"}],"_id":"20982","language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319099699","9783319099705"]},"citation":{"ama":"Koch T, Holtmann J, DeAntoni J. Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications. In: <i>Software Architecture</i>. Cham; 2014. doi:<a href=\"https://doi.org/10.1007/978-3-319-09970-5_14\">10.1007/978-3-319-09970-5_14</a>","chicago":"Koch, Thorsten, Jörg Holtmann, and Julien DeAntoni. “Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications.” In <i>Software Architecture</i>. Cham, 2014. <a href=\"https://doi.org/10.1007/978-3-319-09970-5_14\">https://doi.org/10.1007/978-3-319-09970-5_14</a>.","ieee":"T. Koch, J. Holtmann, and J. DeAntoni, “Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications,” in <i>Software Architecture</i>, Cham, 2014.","apa":"Koch, T., Holtmann, J., &#38; DeAntoni, J. (2014). Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications. In <i>Software Architecture</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-319-09970-5_14\">https://doi.org/10.1007/978-3-319-09970-5_14</a>","bibtex":"@inbook{Koch_Holtmann_DeAntoni_2014, place={Cham}, title={Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-09970-5_14\">10.1007/978-3-319-09970-5_14</a>}, booktitle={Software Architecture}, author={Koch, Thorsten and Holtmann, Jörg and DeAntoni, Julien}, year={2014} }","mla":"Koch, Thorsten, et al. “Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications.” <i>Software Architecture</i>, 2014, doi:<a href=\"https://doi.org/10.1007/978-3-319-09970-5_14\">10.1007/978-3-319-09970-5_14</a>.","short":"T. Koch, J. Holtmann, J. DeAntoni, in: Software Architecture, Cham, 2014."},"place":"Cham","year":"2014","date_created":"2021-01-13T13:34:35Z","author":[{"full_name":"Koch, Thorsten","id":"13616","last_name":"Koch","first_name":"Thorsten"},{"last_name":"Holtmann","orcid":"0000-0001-6141-4571","id":"3875","full_name":"Holtmann, Jörg","first_name":"Jörg"},{"full_name":"DeAntoni, Julien","last_name":"DeAntoni","first_name":"Julien"}],"date_updated":"2022-01-06T06:54:42Z","doi":"10.1007/978-3-319-09970-5_14","title":"Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications"},{"title":"Combining Scenario-based and Architecture-based Timing Requirements","author":[{"first_name":"Thorsten","id":"13616","full_name":"Koch, Thorsten","last_name":"Koch"}],"date_created":"2021-01-13T13:44:06Z","date_updated":"2022-01-06T06:54:42Z","publisher":"University of Paderborn","citation":{"bibtex":"@book{Koch_2013, title={Combining Scenario-based and Architecture-based Timing Requirements}, publisher={University of Paderborn}, author={Koch, Thorsten}, year={2013} }","short":"T. Koch, Combining Scenario-Based and Architecture-Based Timing Requirements, University of Paderborn, 2013.","mla":"Koch, Thorsten. <i>Combining Scenario-Based and Architecture-Based Timing Requirements</i>. University of Paderborn, 2013.","apa":"Koch, T. (2013). <i>Combining Scenario-based and Architecture-based Timing Requirements</i>. University of Paderborn.","ama":"Koch T. <i>Combining Scenario-Based and Architecture-Based Timing Requirements</i>. University of Paderborn; 2013.","chicago":"Koch, Thorsten. <i>Combining Scenario-Based and Architecture-Based Timing Requirements</i>. University of Paderborn, 2013.","ieee":"T. Koch, <i>Combining Scenario-based and Architecture-based Timing Requirements</i>. University of Paderborn, 2013."},"year":"2013","language":[{"iso":"eng"}],"department":[{"_id":"76"}],"user_id":"5786","_id":"20985","status":"public","abstract":[{"lang":"ger","text":"Die in der Automobilindustrie verwendeten eingebetteten Systeme gehören zu den komplexesten eingebetteten Systemen. Die Automobilhersteller sind in der Entwicklung ständig bemüht sowohl die Sicherheit und den Komfort des Fahrers also auch der anderen Insassen zu verbessern. Die meisten der entwickelten Systeme sind sowohl zeit- als auch sicherheitskritisch. Einer Studie von Mercedes-Benz zufolge resultieren 80% der Innovationen in der Automobilbranche aus neuen Elektronikkomponenten, deren Funktionen zu 90% durch Software realisiert wird. Um die steigende Komplexität in der Entwicklung von eingebetteten Systemen zu beherrschen wird in der Automobilbranche immer öfter die modelbasierte Softwareentwicklung anstelle der klassischen Programmierung eingesetzt. Im Requirements Engineering, der ersten Phase der Entwicklung eines Produktes, werden die Anforderungen gesammelt und dokumentiert. Die Dokumentation erfolgt mittels natürlicher Sprache. Modellbasierte Ansätze werden heutzutage höchstens unterstützend eingesetzt. Während des Requirements Engineerings muss der Requirements Engineer sowohl die funktionalen Anforderungen an das zu entwickelnde System als auch seine zeitlichen Anforderungen spezifizieren und analysieren. Die funktionalen Anforderungen umfassen dabei insbesondere die Kommunikation zwischen den verschiedenen Teilsystemen. Szenarien stellen eine intuitive Möglichkeit zur Modellierung von funktionalen Anforderungen dar. Im Rahmen dieser Arbeit wird ein modellbasierter Ansatz zur Modellierung von Szenarien verwendet. Anforderungen an das zeitliche Verhalten werden innerhalb der Architektur spezifiziert. Dazu stehen in der Automobilbranche Architekturbeschreibungssprachen wie EAST-ADL zur Verfügung. Obwohl sowohl funktionale als auch zeitliche Anforderungen an das System spezifiziert und analysiert werden müssen, existiert bisher keine Methodik, die beide Ansätze miteinander kombiniert. Aus diesem Grund wurde im Rahmen dieser Arbeit eine neue Requirements Engineering Methodik entwickelt, die eine systematische und ganzheitliche Spezifikation und Analyse der funktionalen und zeitlichen Anforderungen bereitstellt. Wir haben zwei Modelltransformationen entwickelt, um den Requirements Engineer beim Übergang von den funktionalen zu den zeitlichen Anforderungen zu unterstützen. Die vorliegende Arbeit wird durch eine Evaluierung der Methodik, sowie der Modelltransformationen auf Basis eines Komfortsteuergerätes abgerundet.\r\n"}],"type":"mastersthesis"}]
