[{"year":"2023","citation":{"short":"L. Luo, G. Piskachev, R. Krishnamurthy, J. Dolby, M. Schäf, E. Bodden, in: IEEE International Conference on Software Testing, Verification and Validation (ICST), 2023.","ieee":"L. Luo, G. Piskachev, R. Krishnamurthy, J. Dolby, M. Schäf, and E. Bodden, “Model Generation For Java Frameworks,” 2023.","chicago":"Luo, Linghui, Goran Piskachev, Ranjith Krishnamurthy, Julian Dolby, Martin Schäf, and Eric Bodden. “Model Generation For Java Frameworks.” In IEEE International Conference on Software Testing, Verification and Validation (ICST), 2023.","ama":"Luo L, Piskachev G, Krishnamurthy R, Dolby J, Schäf M, Bodden E. Model Generation For Java Frameworks. In: IEEE International Conference on Software Testing, Verification and Validation (ICST). ; 2023.","apa":"Luo, L., Piskachev, G., Krishnamurthy, R., Dolby, J., Schäf, M., & Bodden, E. (2023). Model Generation For Java Frameworks. IEEE International Conference on Software Testing, Verification and Validation (ICST).","mla":"Luo, Linghui, et al. “Model Generation For Java Frameworks.” IEEE International Conference on Software Testing, Verification and Validation (ICST), 2023.","bibtex":"@inproceedings{Luo_Piskachev_Krishnamurthy_Dolby_Schäf_Bodden_2023, title={Model Generation For Java Frameworks}, booktitle={IEEE International Conference on Software Testing, Verification and Validation (ICST)}, author={Luo, Linghui and Piskachev, Goran and Krishnamurthy, Ranjith and Dolby, Julian and Schäf, Martin and Bodden, Eric}, year={2023} }"},"type":"conference","language":[{"iso":"eng"}],"_id":"41812","date_updated":"2023-02-06T10:42:29Z","status":"public","date_created":"2023-02-06T10:37:23Z","author":[{"last_name":"Luo","first_name":"Linghui","full_name":"Luo, Linghui"},{"last_name":"Piskachev","id":"41936","first_name":"Goran","orcid":"0000-0003-4424-5838","full_name":"Piskachev, Goran"},{"full_name":"Krishnamurthy, Ranjith","orcid":"0000-0002-0906-5463","first_name":"Ranjith","id":"78060","last_name":"Krishnamurthy"},{"last_name":"Dolby","full_name":"Dolby, Julian","first_name":"Julian"},{"last_name":"Schäf","full_name":"Schäf, Martin","first_name":"Martin"},{"last_name":"Bodden","id":"59256","first_name":"Eric","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric"}],"department":[{"_id":"76"},{"_id":"662"}],"publication":"IEEE International Conference on Software Testing, Verification and Validation (ICST)","title":"Model Generation For Java Frameworks","user_id":"15249"},{"year":"2023","type":"conference","citation":{"mla":"Trentinaglia, Roman, et al. “Eliciting Security Requirements – An Experience Report.” REFSQ 2023: Requirements Engineering: Foundation for Software Quality, Springer Nature Switzerland, 2023, doi:10.1007/978-3-031-29786-1_25.","bibtex":"@inproceedings{Trentinaglia_Merschjohann_Fockel_Eikerling_2023, place={Cham}, title={Eliciting Security Requirements – An Experience Report}, DOI={10.1007/978-3-031-29786-1_25}, booktitle={REFSQ 2023: Requirements Engineering: Foundation for Software Quality}, publisher={Springer Nature Switzerland}, author={Trentinaglia, Roman and Merschjohann, Sven and Fockel, Markus and Eikerling, Hendrik}, year={2023} }","apa":"Trentinaglia, R., Merschjohann, S., Fockel, M., & Eikerling, H. (2023). Eliciting Security Requirements – An Experience Report. REFSQ 2023: Requirements Engineering: Foundation for Software Quality. https://doi.org/10.1007/978-3-031-29786-1_25","ama":"Trentinaglia R, Merschjohann S, Fockel M, Eikerling H. Eliciting Security Requirements – An Experience Report. In: REFSQ 2023: Requirements Engineering: Foundation for Software Quality. Springer Nature Switzerland; 2023. doi:10.1007/978-3-031-29786-1_25","chicago":"Trentinaglia, Roman, Sven Merschjohann, Markus Fockel, and Hendrik Eikerling. “Eliciting Security Requirements – An Experience Report.” In REFSQ 2023: Requirements Engineering: Foundation for Software Quality. Cham: Springer Nature Switzerland, 2023. https://doi.org/10.1007/978-3-031-29786-1_25.","ieee":"R. Trentinaglia, S. Merschjohann, M. Fockel, and H. Eikerling, “Eliciting Security Requirements – An Experience Report,” 2023, doi: 10.1007/978-3-031-29786-1_25.","short":"R. Trentinaglia, S. Merschjohann, M. Fockel, H. Eikerling, in: REFSQ 2023: Requirements Engineering: Foundation for Software Quality, Springer Nature Switzerland, Cham, 2023."},"language":[{"iso":"eng"}],"date_updated":"2023-04-04T12:51:41Z","_id":"43395","doi":"10.1007/978-3-031-29786-1_25","author":[{"last_name":"Trentinaglia","id":"49934","first_name":"Roman","orcid":"0000-0001-9728-4991","full_name":"Trentinaglia, Roman"},{"full_name":"Merschjohann, Sven","first_name":"Sven","id":"11394","last_name":"Merschjohann"},{"full_name":"Fockel, Markus","orcid":"0000-0002-1269-0702","first_name":"Markus","id":"8472","last_name":"Fockel"},{"full_name":"Eikerling, Hendrik","first_name":"Hendrik","id":"29279","last_name":"Eikerling"}],"publisher":"Springer Nature Switzerland","department":[{"_id":"241"},{"_id":"662"}],"publication":"REFSQ 2023: Requirements Engineering: Foundation for Software Quality","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783031297854","9783031297861"]},"status":"public","date_created":"2023-04-04T12:47:31Z","place":"Cham","title":"Eliciting Security Requirements – An Experience Report","user_id":"8472"},{"issue":"5","article_number":"118","intvolume":" 28","_id":"49439","citation":{"ieee":"G. Piskachev, M. Becker, and E. Bodden, “Can the configuration of static analyses make resolving security vulnerabilities more effective? - A user study,” Empirical Software Engineering, vol. 28, no. 5, Art. no. 118, 2023, doi: 10.1007/s10664-023-10354-3.","short":"G. Piskachev, M. Becker, E. Bodden, Empirical Software Engineering 28 (2023).","mla":"Piskachev, Goran, et al. “Can the Configuration of Static Analyses Make Resolving Security Vulnerabilities More Effective? - A User Study.” Empirical Software Engineering, vol. 28, no. 5, 118, Springer Science and Business Media LLC, 2023, doi:10.1007/s10664-023-10354-3.","bibtex":"@article{Piskachev_Becker_Bodden_2023, title={Can the configuration of static analyses make resolving security vulnerabilities more effective? - A user study}, volume={28}, DOI={10.1007/s10664-023-10354-3}, number={5118}, journal={Empirical Software Engineering}, publisher={Springer Science and Business Media LLC}, author={Piskachev, Goran and Becker, Matthias and Bodden, Eric}, year={2023} }","apa":"Piskachev, G., Becker, M., & Bodden, E. (2023). Can the configuration of static analyses make resolving security vulnerabilities more effective? - A user study. Empirical Software Engineering, 28(5), Article 118. https://doi.org/10.1007/s10664-023-10354-3","ama":"Piskachev G, Becker M, Bodden E. Can the configuration of static analyses make resolving security vulnerabilities more effective? - A user study. Empirical Software Engineering. 2023;28(5). doi:10.1007/s10664-023-10354-3","chicago":"Piskachev, Goran, Matthias Becker, and Eric Bodden. “Can the Configuration of Static Analyses Make Resolving Security Vulnerabilities More Effective? - A User Study.” Empirical Software Engineering 28, no. 5 (2023). https://doi.org/10.1007/s10664-023-10354-3."},"type":"journal_article","year":"2023","user_id":"15249","abstract":[{"lang":"eng","text":"AbstractThe use of static analysis security testing (SAST) tools has been increasing in recent years. However, previous studies have shown that, when shipped to end users such as development or security teams, the findings of these tools are often unsatisfying. Users report high numbers of false positives or long analysis times, making the tools unusable in the daily workflow. To address this, SAST tool creators provide a wide range of configuration options, such as customization of rules through domain-specific languages or specification of the application-specific analysis scope. In this paper, we study the configuration space of selected existing SAST tools when used within the integrated development environment (IDE). We focus on the configuration options that impact three dimensions, for which a trade-off is unavoidable, i.e., precision, recall, and analysis runtime. We perform a between-subjects user study with 40 users from multiple development and security teams - to our knowledge, the largest population for this kind of user study in the software engineering community. The results show that users who configure SAST tools are more effective in resolving security vulnerabilities detected by the tools than those using the default configuration. Based on post-study interviews, we identify common strategies that users have while configuring the SAST tools to provide further insights for tool creators. Finally, an evaluation of the configuration options of two commercial SAST tools, Fortify and CheckMarx, reveals that a quarter of the users do not understand the configuration options provided. The configuration options that are found most useful relate to the analysis scope."}],"date_created":"2023-12-04T11:14:34Z","status":"public","volume":28,"publication":"Empirical Software Engineering","keyword":["Software"],"publisher":"Springer Science and Business Media LLC","author":[{"first_name":"Goran","orcid":"0000-0003-4424-5838","full_name":"Piskachev, Goran","last_name":"Piskachev","id":"41936"},{"last_name":"Becker","id":"4870","first_name":"Matthias","orcid":"https://orcid.org/0000-0003-2465-9347","full_name":"Becker, Matthias"},{"id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","first_name":"Eric"}],"doi":"10.1007/s10664-023-10354-3","date_updated":"2023-12-04T11:29:49Z","language":[{"iso":"eng"}],"title":"Can the configuration of static analyses make resolving security vulnerabilities more effective? - A user study","publication_status":"published","publication_identifier":{"issn":["1382-3256","1573-7616"]},"department":[{"_id":"76"},{"_id":"662"}]},{"language":[{"iso":"eng"}],"citation":{"bibtex":"@inproceedings{Fockel_Schubert_Trentinaglia_Schulz_Kirmair_2022, title={Semi-automatic Integrated Safety and Security Analysis for Automotive Systems}, DOI={10.5220/0010778500003119}, booktitle={Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development}, publisher={SCITEPRESS - Science and Technology Publications}, author={Fockel, Markus and Schubert, David and Trentinaglia, Roman and Schulz, Hannes and Kirmair, Wolfgang}, year={2022} }","mla":"Fockel, Markus, et al. “Semi-Automatic Integrated Safety and Security Analysis for Automotive Systems.” Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development, SCITEPRESS - Science and Technology Publications, 2022, doi:10.5220/0010778500003119.","chicago":"Fockel, Markus, David Schubert, Roman Trentinaglia, Hannes Schulz, and Wolfgang Kirmair. “Semi-Automatic Integrated Safety and Security Analysis for Automotive Systems.” In Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development. SCITEPRESS - Science and Technology Publications, 2022. https://doi.org/10.5220/0010778500003119.","ama":"Fockel M, Schubert D, Trentinaglia R, Schulz H, Kirmair W. Semi-automatic Integrated Safety and Security Analysis for Automotive Systems. In: Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development. SCITEPRESS - Science and Technology Publications; 2022. doi:10.5220/0010778500003119","apa":"Fockel, M., Schubert, D., Trentinaglia, R., Schulz, H., & Kirmair, W. (2022). Semi-automatic Integrated Safety and Security Analysis for Automotive Systems. Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development. https://doi.org/10.5220/0010778500003119","ieee":"M. Fockel, D. Schubert, R. Trentinaglia, H. Schulz, and W. Kirmair, “Semi-automatic Integrated Safety and Security Analysis for Automotive Systems,” 2022, doi: 10.5220/0010778500003119.","short":"M. Fockel, D. Schubert, R. Trentinaglia, H. Schulz, W. Kirmair, in: Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development, SCITEPRESS - Science and Technology Publications, 2022."},"type":"conference","year":"2022","doi":"10.5220/0010778500003119","date_updated":"2022-02-15T08:14:07Z","_id":"29847","status":"public","date_created":"2022-02-15T08:07:15Z","publication_status":"published","publisher":"SCITEPRESS - Science and Technology Publications","author":[{"id":"8472","last_name":"Fockel","full_name":"Fockel, Markus","orcid":"0000-0002-1269-0702","first_name":"Markus"},{"id":"9106","last_name":"Schubert","full_name":"Schubert, David","first_name":"David"},{"last_name":"Trentinaglia","id":"49934","first_name":"Roman","full_name":"Trentinaglia, Roman","orcid":"0000-0001-9728-4991"},{"last_name":"Schulz","full_name":"Schulz, Hannes","first_name":"Hannes"},{"first_name":"Wolfgang","full_name":"Kirmair, Wolfgang","last_name":"Kirmair"}],"publication":"Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development","department":[{"_id":"241"},{"_id":"662"}],"user_id":"49934","title":"Semi-automatic Integrated Safety and Security Analysis for Automotive Systems"},{"language":[{"iso":"eng"}],"type":"conference","year":"2022","citation":{"bibtex":"@inproceedings{Koch_Trippel_Dziwok_Bodden_2022, title={Integrating Security Protocols in Scenario-based Requirements Specifications}, DOI={10.5220/0010783300003119}, booktitle={Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development}, publisher={SCITEPRESS - Science and Technology Publications}, author={Koch, Thorsten and Trippel, Sascha and Dziwok, Stefan and Bodden, Eric}, year={2022} }","mla":"Koch, Thorsten, et al. “Integrating Security Protocols in Scenario-Based Requirements Specifications.” Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development, SCITEPRESS - Science and Technology Publications, 2022, doi:10.5220/0010783300003119.","chicago":"Koch, Thorsten, Sascha Trippel, Stefan Dziwok, and Eric Bodden. “Integrating Security Protocols in Scenario-Based Requirements Specifications.” In Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development. SCITEPRESS - Science and Technology Publications, 2022. https://doi.org/10.5220/0010783300003119.","apa":"Koch, T., Trippel, S., Dziwok, S., & Bodden, E. (2022). Integrating Security Protocols in Scenario-based Requirements Specifications. Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development. https://doi.org/10.5220/0010783300003119","ama":"Koch T, Trippel S, Dziwok S, Bodden E. Integrating Security Protocols in Scenario-based Requirements Specifications. In: Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development. SCITEPRESS - Science and Technology Publications; 2022. doi:10.5220/0010783300003119","ieee":"T. Koch, S. Trippel, S. Dziwok, and E. Bodden, “Integrating Security Protocols in Scenario-based Requirements Specifications,” 2022, doi: 10.5220/0010783300003119.","short":"T. Koch, S. Trippel, S. Dziwok, E. Bodden, in: Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development, SCITEPRESS - Science and Technology Publications, 2022."},"date_updated":"2022-02-15T07:48:53Z","_id":"29844","doi":"10.5220/0010783300003119","publisher":"SCITEPRESS - Science and Technology Publications","author":[{"first_name":"Thorsten","full_name":"Koch, Thorsten","last_name":"Koch","id":"13616"},{"full_name":"Trippel, Sascha","first_name":"Sascha","last_name":"Trippel"},{"id":"3901","last_name":"Dziwok","full_name":"Dziwok, Stefan","orcid":"http://orcid.org/0000-0002-8679-6673","first_name":"Stefan"},{"last_name":"Bodden","id":"59256","first_name":"Eric","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric"}],"department":[{"_id":"241"},{"_id":"662"}],"publication":"Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development","status":"public","date_created":"2022-02-15T07:47:51Z","publication_status":"published","user_id":"13616","title":"Integrating Security Protocols in Scenario-based Requirements Specifications"},{"title":"Deriving model-based safety and security assurance cases from design rationale of countermeasure patterns","user_id":"49934","publication_status":"published","status":"public","date_created":"2022-12-09T08:50:22Z","publisher":"ACM","author":[{"full_name":"Trentinaglia, Roman","first_name":"Roman","last_name":"Trentinaglia"}],"department":[{"_id":"241"},{"_id":"662"}],"publication":"Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings","doi":"10.1145/3550356.3558508","_id":"34298","date_updated":"2022-12-09T08:51:54Z","citation":{"short":"R. Trentinaglia, in: Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings, ACM, 2022.","ieee":"R. Trentinaglia, “Deriving model-based safety and security assurance cases from design rationale of countermeasure patterns,” 2022, doi: 10.1145/3550356.3558508.","chicago":"Trentinaglia, Roman. “Deriving Model-Based Safety and Security Assurance Cases from Design Rationale of Countermeasure Patterns.” In Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings. ACM, 2022. https://doi.org/10.1145/3550356.3558508.","ama":"Trentinaglia R. Deriving model-based safety and security assurance cases from design rationale of countermeasure patterns. In: Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings. ACM; 2022. doi:10.1145/3550356.3558508","apa":"Trentinaglia, R. (2022). Deriving model-based safety and security assurance cases from design rationale of countermeasure patterns. Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings. https://doi.org/10.1145/3550356.3558508","mla":"Trentinaglia, Roman. “Deriving Model-Based Safety and Security Assurance Cases from Design Rationale of Countermeasure Patterns.” Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings, ACM, 2022, doi:10.1145/3550356.3558508.","bibtex":"@inproceedings{Trentinaglia_2022, title={Deriving model-based safety and security assurance cases from design rationale of countermeasure patterns}, DOI={10.1145/3550356.3558508}, booktitle={Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings}, publisher={ACM}, author={Trentinaglia, Roman}, year={2022} }"},"year":"2022","type":"conference"},{"keyword":["Modeling and Simulation","Software"],"publication":"Software and Systems Modeling","department":[{"_id":"241"},{"_id":"662"}],"publisher":"Springer Science and Business Media LLC","author":[{"last_name":"Holtmann","id":"3875","first_name":"Jörg","orcid":"0000-0001-6141-4571","full_name":"Holtmann, Jörg"},{"full_name":"Deantoni, Julien","first_name":"Julien","last_name":"Deantoni"},{"first_name":"Markus","orcid":"0000-0002-1269-0702","full_name":"Fockel, Markus","last_name":"Fockel","id":"8472"}],"publication_identifier":{"issn":["1619-1366","1619-1374"]},"publication_status":"published","date_created":"2022-05-05T14:05:32Z","status":"public","abstract":[{"text":"Distributed, software-intensive systems (e.g., in the automotive sector) must fulfill communication requirements under hard real-time constraints. The requirements have to be documented and validated carefully using a systematic requirements engineering (RE) approach, for example, by applying scenario-based requirements notations. The resources of the execution platforms and their properties (e.g., CPU frequency or bus throughput) induce effects on the timing behavior, which may lead to violations of the real-time requirements. Nowadays, the platform properties and their induced timing effects are verified against the real-time requirements by means of timing analysis techniques mostly implemented in commercial-off-the-shelf tools. However, such timing analyses are conducted in late development phases since they rely on artifacts produced during these phases (e.g., the platform-specific code). In order to enable early timing analyses already during RE, we extend a scenario-based requirements notation with allocation means to platform models and define operational semantics for the purpose of simulation-based, platform-aware timing analyses. We illustrate and evaluate the approach with an automotive software-intensive system.","lang":"eng"}],"title":"Early timing analysis based on scenario requirements and platform models","user_id":"8472","type":"journal_article","year":"2022","citation":{"ieee":"J. Holtmann, J. Deantoni, and M. Fockel, “Early timing analysis based on scenario requirements and platform models,” Software and Systems Modeling, 2022, doi: 10.1007/s10270-022-01002-3.","short":"J. Holtmann, J. Deantoni, M. Fockel, Software and Systems Modeling (2022).","bibtex":"@article{Holtmann_Deantoni_Fockel_2022, title={Early timing analysis based on scenario requirements and platform models}, DOI={10.1007/s10270-022-01002-3}, journal={Software and Systems Modeling}, publisher={Springer Science and Business Media LLC}, author={Holtmann, Jörg and Deantoni, Julien and Fockel, Markus}, year={2022} }","mla":"Holtmann, Jörg, et al. “Early Timing Analysis Based on Scenario Requirements and Platform Models.” Software and Systems Modeling, Springer Science and Business Media LLC, 2022, doi:10.1007/s10270-022-01002-3.","ama":"Holtmann J, Deantoni J, Fockel M. Early timing analysis based on scenario requirements and platform models. Software and Systems Modeling. Published online 2022. doi:10.1007/s10270-022-01002-3","apa":"Holtmann, J., Deantoni, J., & Fockel, M. (2022). Early timing analysis based on scenario requirements and platform models. Software and Systems Modeling. https://doi.org/10.1007/s10270-022-01002-3","chicago":"Holtmann, Jörg, Julien Deantoni, and Markus Fockel. “Early Timing Analysis Based on Scenario Requirements and Platform Models.” Software and Systems Modeling, 2022. https://doi.org/10.1007/s10270-022-01002-3."},"language":[{"iso":"eng"}],"_id":"31071","date_updated":"2022-05-05T14:09:41Z","doi":"10.1007/s10270-022-01002-3"},{"page":"1–33","citation":{"bibtex":"@article{Piskachev_Späth_Budde_Bodden_2022, title={Fluently specifying taint-flow queries with fluentTQL}, volume={27}, number={5}, journal={Empirical Software Engineering}, publisher={Springer}, author={Piskachev, Goran and Späth, Johannes and Budde, Ingo and Bodden, Eric}, year={2022}, pages={1–33} }","mla":"Piskachev, Goran, et al. “Fluently Specifying Taint-Flow Queries with FluentTQL.” Empirical Software Engineering, vol. 27, no. 5, Springer, 2022, pp. 1–33.","chicago":"Piskachev, Goran, Johannes Späth, Ingo Budde, and Eric Bodden. “Fluently Specifying Taint-Flow Queries with FluentTQL.” Empirical Software Engineering 27, no. 5 (2022): 1–33.","apa":"Piskachev, G., Späth, J., Budde, I., & Bodden, E. (2022). Fluently specifying taint-flow queries with fluentTQL. Empirical Software Engineering, 27(5), 1–33.","ama":"Piskachev G, Späth J, Budde I, Bodden E. Fluently specifying taint-flow queries with fluentTQL. Empirical Software Engineering. 2022;27(5):1–33.","ieee":"G. Piskachev, J. Späth, I. Budde, and E. Bodden, “Fluently specifying taint-flow queries with fluentTQL,” Empirical Software Engineering, vol. 27, no. 5, pp. 1–33, 2022.","short":"G. Piskachev, J. Späth, I. Budde, E. Bodden, Empirical Software Engineering 27 (2022) 1–33."},"year":"2022","type":"journal_article","language":[{"iso":"eng"}],"issue":"5","date_updated":"2022-10-20T12:36:23Z","_id":"33836","intvolume":" 27","volume":27,"date_created":"2022-10-20T12:34:04Z","status":"public","publication":"Empirical Software Engineering","department":[{"_id":"76"},{"_id":"662"}],"publisher":"Springer","author":[{"full_name":"Piskachev, Goran","orcid":"0000-0003-4424-5838","first_name":"Goran","id":"41936","last_name":"Piskachev"},{"full_name":"Späth, Johannes","first_name":"Johannes","last_name":"Späth"},{"first_name":"Ingo","full_name":"Budde, Ingo","orcid":"https://orcid.org/0000-0003-0124-6291","last_name":"Budde","id":"13693"},{"orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","first_name":"Eric","id":"59256","last_name":"Bodden"}],"title":"Fluently specifying taint-flow queries with fluentTQL","user_id":"15249"},{"department":[{"_id":"76"},{"_id":"662"}],"author":[{"first_name":"Ranjith","full_name":"Krishnamurthy, Ranjith","orcid":"0000-0002-0906-5463","last_name":"Krishnamurthy","id":"78060"},{"last_name":"Piskachev","id":"41936","first_name":"Goran","full_name":"Piskachev, Goran","orcid":"0000-0003-4424-5838"},{"id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","first_name":"Eric"}],"date_created":"2022-10-20T12:38:09Z","status":"public","title":"To what extent can we analyze Kotlin programs using existing Java taint analysis tools?","user_id":"15249","series_title":"IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM)","type":"conference","citation":{"short":"R. Krishnamurthy, G. Piskachev, E. Bodden, (2022).","ieee":"R. Krishnamurthy, G. Piskachev, and E. Bodden, “To what extent can we analyze Kotlin programs using existing Java taint analysis tools?” 2022.","chicago":"Krishnamurthy, Ranjith, Goran Piskachev, and Eric Bodden. “To What Extent Can We Analyze Kotlin Programs Using Existing Java Taint Analysis Tools?” IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM), 2022.","apa":"Krishnamurthy, R., Piskachev, G., & Bodden, E. (2022). To what extent can we analyze Kotlin programs using existing Java taint analysis tools?","ama":"Krishnamurthy R, Piskachev G, Bodden E. To what extent can we analyze Kotlin programs using existing Java taint analysis tools? Published online 2022.","bibtex":"@article{Krishnamurthy_Piskachev_Bodden_2022, series={IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM)}, title={To what extent can we analyze Kotlin programs using existing Java taint analysis tools?}, author={Krishnamurthy, Ranjith and Piskachev, Goran and Bodden, Eric}, year={2022}, collection={IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM)} }","mla":"Krishnamurthy, Ranjith, et al. To What Extent Can We Analyze Kotlin Programs Using Existing Java Taint Analysis Tools? 2022."},"year":"2022","language":[{"iso":"eng"}],"_id":"33838","date_updated":"2022-10-20T12:38:32Z"},{"language":[{"iso":"eng"}],"type":"conference","citation":{"short":"G. Piskachev, S. Dziwok, T. Koch, S. Merschjohann, E. Bodden, (2022).","ieee":"G. Piskachev, S. Dziwok, T. Koch, S. Merschjohann, and E. Bodden, “How far are German companies in improving security through static program analysis tools?” 2022.","apa":"Piskachev, G., Dziwok, S., Koch, T., Merschjohann, S., & Bodden, E. (2022). How far are German companies in improving security through static program analysis tools?","ama":"Piskachev G, Dziwok S, Koch T, Merschjohann S, Bodden E. How far are German companies in improving security through static program analysis tools? Published online 2022.","chicago":"Piskachev, Goran, Stefan Dziwok, Thorsten Koch, Sven Merschjohann, and Eric Bodden. “How Far Are German Companies in Improving Security through Static Program Analysis Tools?” IEEE Secure Development Conference (SecDev), 2022.","bibtex":"@article{Piskachev_Dziwok_Koch_Merschjohann_Bodden_2022, series={IEEE Secure Development Conference (SecDev)}, title={How far are German companies in improving security through static program analysis tools?}, author={Piskachev, Goran and Dziwok, Stefan and Koch, Thorsten and Merschjohann, Sven and Bodden, Eric}, year={2022}, collection={IEEE Secure Development Conference (SecDev)} }","mla":"Piskachev, Goran, et al. How Far Are German Companies in Improving Security through Static Program Analysis Tools? 2022."},"year":"2022","series_title":"IEEE Secure Development Conference (SecDev)","_id":"33837","date_updated":"2022-10-20T12:37:44Z","status":"public","date_created":"2022-10-20T12:37:14Z","author":[{"first_name":"Goran","full_name":"Piskachev, Goran","orcid":"0000-0003-4424-5838","last_name":"Piskachev","id":"41936"},{"first_name":"Stefan","orcid":"http://orcid.org/0000-0002-8679-6673","full_name":"Dziwok, Stefan","last_name":"Dziwok","id":"3901"},{"last_name":"Koch","id":"13616","first_name":"Thorsten","full_name":"Koch, Thorsten"},{"full_name":"Merschjohann, Sven","first_name":"Sven","id":"11394","last_name":"Merschjohann"},{"orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","first_name":"Eric","id":"59256","last_name":"Bodden"}],"department":[{"_id":"76"},{"_id":"662"}],"user_id":"15249","title":"How far are German companies in improving security through static program analysis tools?"},{"doi":"10.18420/SE2021_18","date_updated":"2022-01-06T06:54:54Z","language":[{"iso":"eng"}],"series_title":"Lecture Notes in Informatics (LNI)","title":"Cutting through the Jungle: Disambiguating Model-based Traceability Terminology (Extended Abstract)","publication_identifier":{"eisbn":["978-3-88579-704-3"]},"editor":[{"last_name":"Koziolek","first_name":"Anne","full_name":"Koziolek, Anne"},{"first_name":"Ina","full_name":"Schaefer, Ina","last_name":"Schaefer"},{"full_name":"Seidl, Christoph","first_name":"Christoph","last_name":"Seidl"}],"department":[{"_id":"241"},{"_id":"662"}],"conference":{"end_date":"2021-02-26","start_date":"2021-02-22","name":"Software Engineering 2021","location":"Remote / Braunschweig, Germany "},"_id":"21326","page":"59-60","year":"2021","type":"conference","citation":{"ieee":"J. Holtmann, J.-P. Steghöfer, M. Rath, and D. Schmelter, “Cutting through the Jungle: Disambiguating Model-based Traceability Terminology (Extended Abstract),” in Software Engineering 2021, Remote / Braunschweig, Germany , 2021, vol. P-310, pp. 59–60.","short":"J. Holtmann, J.-P. Steghöfer, M. Rath, D. Schmelter, in: A. Koziolek, I. Schaefer, C. Seidl (Eds.), Software Engineering 2021, 2021, pp. 59–60.","mla":"Holtmann, Jörg, et al. “Cutting through the Jungle: Disambiguating Model-Based Traceability Terminology (Extended Abstract).” Software Engineering 2021, edited by Anne Koziolek et al., vol. P-310, 2021, pp. 59–60, doi:10.18420/SE2021_18.","bibtex":"@inproceedings{Holtmann_Steghöfer_Rath_Schmelter_2021, series={Lecture Notes in Informatics (LNI)}, title={Cutting through the Jungle: Disambiguating Model-based Traceability Terminology (Extended Abstract)}, volume={P-310}, DOI={10.18420/SE2021_18}, booktitle={Software Engineering 2021}, author={Holtmann, Jörg and Steghöfer, Jan-Phillipp and Rath, Michael and Schmelter, David}, editor={Koziolek, Anne and Schaefer, Ina and Seidl, ChristophEditors}, year={2021}, pages={59–60}, collection={Lecture Notes in Informatics (LNI)} }","apa":"Holtmann, J., Steghöfer, J.-P., Rath, M., & Schmelter, D. (2021). Cutting through the Jungle: Disambiguating Model-based Traceability Terminology (Extended Abstract). In A. Koziolek, I. Schaefer, & C. Seidl (Eds.), Software Engineering 2021 (Vol. P-310, pp. 59–60). Remote / Braunschweig, Germany . https://doi.org/10.18420/SE2021_18","ama":"Holtmann J, Steghöfer J-P, Rath M, Schmelter D. Cutting through the Jungle: Disambiguating Model-based Traceability Terminology (Extended Abstract). In: Koziolek A, Schaefer I, Seidl C, eds. Software Engineering 2021. Vol P-310. Lecture Notes in Informatics (LNI). ; 2021:59-60. doi:10.18420/SE2021_18","chicago":"Holtmann, Jörg, Jan-Phillipp Steghöfer, Michael Rath, and David Schmelter. “Cutting through the Jungle: Disambiguating Model-Based Traceability Terminology (Extended Abstract).” In Software Engineering 2021, edited by Anne Koziolek, Ina Schaefer, and Christoph Seidl, P-310:59–60. Lecture Notes in Informatics (LNI), 2021. https://doi.org/10.18420/SE2021_18."},"user_id":"40982","ddc":["000"],"date_created":"2021-03-01T09:36:39Z","status":"public","has_accepted_license":"1","volume":"P-310","file":[{"access_level":"closed","file_name":"HSRS21.pdf","date_created":"2021-03-01T09:34:38Z","relation":"main_file","success":1,"content_type":"application/pdf","date_updated":"2021-03-01T09:34:38Z","file_id":"21329","creator":"chrome","file_size":148240}],"file_date_updated":"2021-03-01T09:34:38Z","publication":"Software Engineering 2021","author":[{"first_name":"Jörg","orcid":"0000-0001-6141-4571","full_name":"Holtmann, Jörg","last_name":"Holtmann","id":"3875"},{"full_name":"Steghöfer, Jan-Phillipp","first_name":"Jan-Phillipp","last_name":"Steghöfer"},{"last_name":"Rath","first_name":"Michael","full_name":"Rath, Michael"},{"full_name":"Schmelter, David","orcid":"0000-0001-7787-5380","first_name":"David","id":"40982","last_name":"Schmelter"}]},{"publisher":"Frontiers Media","author":[{"last_name":"Schubert","id":"9106","first_name":"David","full_name":"Schubert, David"},{"full_name":"Eikerling, Hendrik","first_name":"Hendrik","id":"29279","last_name":"Eikerling"},{"last_name":"Holtmann","id":"3875","first_name":"Jörg","orcid":"0000-0001-6141-4571","full_name":"Holtmann, Jörg"}],"publication":"Frontiers in Computer Science","volume":3,"status":"public","date_created":"2021-08-26T09:53:54Z","abstract":[{"text":"Modern and flexible application-level software platforms increase the attack surface of connected vehicles and thereby require automotive engineers to adopt additional security control techniques. These techniques encompass host-based intrusion detection systems (HIDSs) that detect suspicious activities in application contexts. Such application-aware HIDSs originate in information and communications technology systems and have a great potential to deal with the flexible nature of application-level software platforms. However, the elementary characteristics of known application-aware HIDS approaches and thereby the implications for their transfer to the automotive sector are unclear. In previous work, we presented a systematic literature review (SLR) covering the state of the art of application-aware HIDS approaches. We synthesized our findings by means of a fine-grained classification for each approach specified through a feature model and corresponding variant models. These models represent the approaches’ elementary characteristics. Furthermore, we summarized key findings and inferred implications for the transfer of application-aware HIDSs to the automotive sector. In this article, we extend the previous work by several aspects. We adjust the quality evaluation process within the SLR to be able to consider high quality conference publications, which results in an extended final pool of publications. For supporting HIDS developers on the task of configuring HIDS analysis techniques based on machine learning, we report on initial results on the applicability of AutoML. Furthermore, we present lessons learned regarding the application of the feature and variant model approach for SLRs. Finally, we more thoroughly describe the SLR study design.","lang":"eng"}],"user_id":"29279","main_file_link":[{"open_access":"1","url":"https://www.frontiersin.org/articles/10.3389/fcomp.2021.567873/full"}],"year":"2021","citation":{"bibtex":"@article{Schubert_Eikerling_Holtmann_2021, title={Application-Aware Intrusion Detection: A Systematic Literature Review, Implications for Automotive Systems, and Applicability of AutoML}, volume={3}, DOI={10.3389/fcomp.2021.567873}, journal={Frontiers in Computer Science}, publisher={Frontiers Media}, author={Schubert, David and Eikerling, Hendrik and Holtmann, Jörg}, year={2021} }","mla":"Schubert, David, et al. “Application-Aware Intrusion Detection: A Systematic Literature Review, Implications for Automotive Systems, and Applicability of AutoML.” Frontiers in Computer Science, vol. 3, Frontiers Media, 2021, doi:10.3389/fcomp.2021.567873.","ama":"Schubert D, Eikerling H, Holtmann J. Application-Aware Intrusion Detection: A Systematic Literature Review, Implications for Automotive Systems, and Applicability of AutoML. Frontiers in Computer Science. 2021;3. doi:10.3389/fcomp.2021.567873","apa":"Schubert, D., Eikerling, H., & Holtmann, J. (2021). Application-Aware Intrusion Detection: A Systematic Literature Review, Implications for Automotive Systems, and Applicability of AutoML. Frontiers in Computer Science, 3. https://doi.org/10.3389/fcomp.2021.567873","chicago":"Schubert, David, Hendrik Eikerling, and Jörg Holtmann. “Application-Aware Intrusion Detection: A Systematic Literature Review, Implications for Automotive Systems, and Applicability of AutoML.” Frontiers in Computer Science 3 (2021). https://doi.org/10.3389/fcomp.2021.567873.","ieee":"D. Schubert, H. Eikerling, and J. Holtmann, “Application-Aware Intrusion Detection: A Systematic Literature Review, Implications for Automotive Systems, and Applicability of AutoML,” Frontiers in Computer Science, vol. 3, 2021.","short":"D. Schubert, H. Eikerling, J. Holtmann, Frontiers in Computer Science 3 (2021)."},"type":"journal_article","_id":"23526","intvolume":" 3","department":[{"_id":"241"},{"_id":"662"}],"publication_identifier":{"issn":["2624-9898"]},"publication_status":"published","title":"Application-Aware Intrusion Detection: A Systematic Literature Review, Implications for Automotive Systems, and Applicability of AutoML","language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:55:56Z","doi":"10.3389/fcomp.2021.567873","oa":"1"},{"language":[{"iso":"eng"}],"citation":{"apa":"Dziwok, S., Koch, T., Merschjohann, S., Budweg, B., & Leuer, S. (2021). AppSecure.nrw Software Security Study. ArXiv:2108.11752.","ama":"Dziwok S, Koch T, Merschjohann S, Budweg B, Leuer S. AppSecure.nrw Software Security Study. arXiv:210811752. 2021.","chicago":"Dziwok, Stefan, Thorsten Koch, Sven Merschjohann, Boris Budweg, and Sebastian Leuer. “AppSecure.Nrw Software Security Study.” ArXiv:2108.11752, 2021.","bibtex":"@article{Dziwok_Koch_Merschjohann_Budweg_Leuer_2021, title={AppSecure.nrw Software Security Study}, journal={arXiv:2108.11752}, author={Dziwok, Stefan and Koch, Thorsten and Merschjohann, Sven and Budweg, Boris and Leuer, Sebastian}, year={2021} }","mla":"Dziwok, Stefan, et al. “AppSecure.Nrw Software Security Study.” ArXiv:2108.11752, 2021.","short":"S. Dziwok, T. Koch, S. Merschjohann, B. Budweg, S. Leuer, ArXiv:2108.11752 (2021).","ieee":"S. Dziwok, T. Koch, S. Merschjohann, B. Budweg, and S. Leuer, “AppSecure.nrw Software Security Study,” arXiv:2108.11752. 2021."},"type":"preprint","year":"2021","date_updated":"2022-01-06T06:55:56Z","_id":"23534","author":[{"id":"3901","last_name":"Dziwok","full_name":"Dziwok, Stefan","orcid":"http://orcid.org/0000-0002-8679-6673","first_name":"Stefan"},{"full_name":"Koch, Thorsten","first_name":"Thorsten","id":"13616","last_name":"Koch"},{"first_name":"Sven","full_name":"Merschjohann, Sven","last_name":"Merschjohann","id":"11394"},{"last_name":"Budweg","first_name":"Boris","full_name":"Budweg, Boris"},{"last_name":"Leuer","first_name":"Sebastian","full_name":"Leuer, Sebastian"}],"department":[{"_id":"241"},{"_id":"662"}],"publication":"arXiv:2108.11752","status":"public","date_created":"2021-08-27T04:57:00Z","abstract":[{"lang":"eng","text":"In recent years, the World Economic Forum has identified software security as\r\nthe most significant technological risk to the world's population, as\r\nsoftware-intensive systems process critical data and provide critical services.\r\nThis raises the question of the extent to which German companies are addressing\r\nsoftware security in developing and operating their software products. This\r\npaper reports on the results of an extensive study among developers, product\r\nowners, and managers to answer this question. Our results show that ensuring\r\nsecurity is a multi-faceted challenge for companies, involving low awareness,\r\ninaccurate self-assessment, and a lack of competence on the topic of secure\r\nsoftware development among all stakeholders. The current situation in software\r\ndevelopment is therefore detrimental to the security of software products in\r\nthe medium and long term."}],"user_id":"13616","title":"AppSecure.nrw Software Security Study"},{"date_updated":"2022-01-06T06:55:50Z","_id":"23374","doi":"10.1109/iccq51190.2021.9392986","language":[{"iso":"eng"}],"type":"conference","citation":{"ieee":"S. Kummita, G. Piskachev, J. Spath, and E. Bodden, “Qualitative and Quantitative Analysis of Callgraph Algorithms for Python,” 2021, doi: 10.1109/iccq51190.2021.9392986.","short":"S. Kummita, G. Piskachev, J. Spath, E. Bodden, in: 2021 International Conference on Code Quality (ICCQ), 2021.","mla":"Kummita, Sriteja, et al. “Qualitative and Quantitative Analysis of Callgraph Algorithms for Python.” 2021 International Conference on Code Quality (ICCQ), 2021, doi:10.1109/iccq51190.2021.9392986.","bibtex":"@inproceedings{Kummita_Piskachev_Spath_Bodden_2021, title={Qualitative and Quantitative Analysis of Callgraph Algorithms for Python}, DOI={10.1109/iccq51190.2021.9392986}, booktitle={2021 International Conference on Code Quality (ICCQ)}, author={Kummita, Sriteja and Piskachev, Goran and Spath, Johannes and Bodden, Eric}, year={2021} }","apa":"Kummita, S., Piskachev, G., Spath, J., & Bodden, E. (2021). Qualitative and Quantitative Analysis of Callgraph Algorithms for Python. 2021 International Conference on Code Quality (ICCQ). https://doi.org/10.1109/iccq51190.2021.9392986","ama":"Kummita S, Piskachev G, Spath J, Bodden E. Qualitative and Quantitative Analysis of Callgraph Algorithms for Python. In: 2021 International Conference on Code Quality (ICCQ). ; 2021. doi:10.1109/iccq51190.2021.9392986","chicago":"Kummita, Sriteja, Goran Piskachev, Johannes Spath, and Eric Bodden. “Qualitative and Quantitative Analysis of Callgraph Algorithms for Python.” In 2021 International Conference on Code Quality (ICCQ), 2021. https://doi.org/10.1109/iccq51190.2021.9392986."},"year":"2021","user_id":"5786","title":"Qualitative and Quantitative Analysis of Callgraph Algorithms for Python","author":[{"first_name":"Sriteja","full_name":"Kummita, Sriteja","last_name":"Kummita"},{"last_name":"Piskachev","first_name":"Goran","full_name":"Piskachev, Goran"},{"first_name":"Johannes","full_name":"Spath, Johannes","last_name":"Spath"},{"full_name":"Bodden, Eric","first_name":"Eric","last_name":"Bodden"}],"department":[{"_id":"241"},{"_id":"662"},{"_id":"76"}],"publication":"2021 International Conference on Code Quality (ICCQ)","status":"public","date_created":"2021-08-09T12:01:11Z","publication_status":"published"},{"publication_status":"published","status":"public","date_created":"2022-02-01T10:21:54Z","publisher":"IEEE","author":[{"last_name":"Steghofer","full_name":"Steghofer, Jan-Philipp","first_name":"Jan-Philipp"},{"first_name":"Bjorn","full_name":"Koopmann, Bjorn","last_name":"Koopmann"},{"last_name":"Steffen Becker","full_name":"Steffen Becker, Jan","first_name":"Jan"},{"last_name":"Stierand","first_name":"Ingo","full_name":"Stierand, Ingo"},{"last_name":"Zeller","first_name":"Marc","full_name":"Zeller, Marc"},{"last_name":"Bonner","first_name":"Maria","full_name":"Bonner, Maria"},{"first_name":"David","orcid":"0000-0001-7787-5380","full_name":"Schmelter, David","last_name":"Schmelter","id":"40982"},{"last_name":"Maro","full_name":"Maro, Salome","first_name":"Salome"}],"publication":"2021 IEEE 29th International Requirements Engineering Conference (RE)","department":[{"_id":"241"},{"_id":"662"}],"title":"The MobSTr Dataset – An Exemplar for Traceability and Model-based Safety Assessment","user_id":"40982","citation":{"mla":"Steghofer, Jan-Philipp, et al. “The MobSTr Dataset – An Exemplar for Traceability and Model-Based Safety Assessment.” 2021 IEEE 29th International Requirements Engineering Conference (RE), IEEE, 2021, doi:10.1109/re51729.2021.00062.","bibtex":"@inproceedings{Steghofer_Koopmann_Steffen Becker_Stierand_Zeller_Bonner_Schmelter_Maro_2021, title={The MobSTr Dataset – An Exemplar for Traceability and Model-based Safety Assessment}, DOI={10.1109/re51729.2021.00062}, booktitle={2021 IEEE 29th International Requirements Engineering Conference (RE)}, publisher={IEEE}, author={Steghofer, Jan-Philipp and Koopmann, Bjorn and Steffen Becker, Jan and Stierand, Ingo and Zeller, Marc and Bonner, Maria and Schmelter, David and Maro, Salome}, year={2021} }","apa":"Steghofer, J.-P., Koopmann, B., Steffen Becker, J., Stierand, I., Zeller, M., Bonner, M., Schmelter, D., & Maro, S. (2021). The MobSTr Dataset – An Exemplar for Traceability and Model-based Safety Assessment. 2021 IEEE 29th International Requirements Engineering Conference (RE). https://doi.org/10.1109/re51729.2021.00062","ama":"Steghofer J-P, Koopmann B, Steffen Becker J, et al. The MobSTr Dataset – An Exemplar for Traceability and Model-based Safety Assessment. In: 2021 IEEE 29th International Requirements Engineering Conference (RE). IEEE; 2021. doi:10.1109/re51729.2021.00062","chicago":"Steghofer, Jan-Philipp, Bjorn Koopmann, Jan Steffen Becker, Ingo Stierand, Marc Zeller, Maria Bonner, David Schmelter, and Salome Maro. “The MobSTr Dataset – An Exemplar for Traceability and Model-Based Safety Assessment.” In 2021 IEEE 29th International Requirements Engineering Conference (RE). IEEE, 2021. https://doi.org/10.1109/re51729.2021.00062.","ieee":"J.-P. Steghofer et al., “The MobSTr Dataset – An Exemplar for Traceability and Model-based Safety Assessment,” 2021, doi: 10.1109/re51729.2021.00062.","short":"J.-P. Steghofer, B. Koopmann, J. Steffen Becker, I. Stierand, M. Zeller, M. Bonner, D. Schmelter, S. Maro, in: 2021 IEEE 29th International Requirements Engineering Conference (RE), IEEE, 2021."},"year":"2021","type":"conference","language":[{"iso":"eng"}],"doi":"10.1109/re51729.2021.00062","date_updated":"2022-02-01T10:24:24Z","_id":"29715"},{"department":[{"_id":"76"},{"_id":"662"}],"publication":"2021 IEEE 21st International Working Conference on Source Code Analysis and Manipulation (SCAM)","author":[{"first_name":"Goran","orcid":"0000-0003-4424-5838","full_name":"Piskachev, Goran","last_name":"Piskachev","id":"41936"},{"last_name":"Krishnamurthy","first_name":"Ranjith","full_name":"Krishnamurthy, Ranjith"},{"id":"59256","last_name":"Bodden","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","first_name":"Eric"}],"date_created":"2021-10-18T12:53:15Z","status":"public","title":"SecuCheck: Engineering configurable taint analysis for software developers","user_id":"15249","citation":{"apa":"Piskachev, G., Krishnamurthy, R., & Bodden, E. (2021). SecuCheck: Engineering configurable taint analysis for software developers. 2021 IEEE 21st International Working Conference on Source Code Analysis and Manipulation (SCAM).","ama":"Piskachev G, Krishnamurthy R, Bodden E. SecuCheck: Engineering configurable taint analysis for software developers. In: 2021 IEEE 21st International Working Conference on Source Code Analysis and Manipulation (SCAM). ; 2021.","chicago":"Piskachev, Goran, Ranjith Krishnamurthy, and Eric Bodden. “SecuCheck: Engineering Configurable Taint Analysis for Software Developers.” In 2021 IEEE 21st International Working Conference on Source Code Analysis and Manipulation (SCAM), 2021.","mla":"Piskachev, Goran, et al. “SecuCheck: Engineering Configurable Taint Analysis for Software Developers.” 2021 IEEE 21st International Working Conference on Source Code Analysis and Manipulation (SCAM), 2021.","bibtex":"@inproceedings{Piskachev_Krishnamurthy_Bodden_2021, title={SecuCheck: Engineering configurable taint analysis for software developers}, booktitle={2021 IEEE 21st International Working Conference on Source Code Analysis and Manipulation (SCAM)}, author={Piskachev, Goran and Krishnamurthy, Ranjith and Bodden, Eric}, year={2021} }","short":"G. Piskachev, R. Krishnamurthy, E. Bodden, in: 2021 IEEE 21st International Working Conference on Source Code Analysis and Manipulation (SCAM), 2021.","ieee":"G. Piskachev, R. Krishnamurthy, and E. Bodden, “SecuCheck: Engineering configurable taint analysis for software developers,” 2021."},"year":"2021","type":"conference","language":[{"iso":"eng"}],"_id":"26407","date_updated":"2022-10-20T12:44:31Z"},{"type":"conference","year":"2020","citation":{"chicago":"Holtmann, Jörg, Jan-Philipp Steghofer, Michael Rath, and David Schmelter. “Cutting through the Jungle: Disambiguating Model-Based Traceability Terminology.” In 2020 IEEE 28th International Requirements Engineering Conference (RE). IEEE, 2020. https://doi.org/10.1109/re48521.2020.00014.","ama":"Holtmann J, Steghofer J-P, Rath M, Schmelter D. Cutting through the Jungle: Disambiguating Model-based Traceability Terminology. In: 2020 IEEE 28th International Requirements Engineering Conference (RE). IEEE; 2020. doi:10.1109/re48521.2020.00014","apa":"Holtmann, J., Steghofer, J.-P., Rath, M., & Schmelter, D. (2020). Cutting through the Jungle: Disambiguating Model-based Traceability Terminology. In 2020 IEEE 28th International Requirements Engineering Conference (RE). IEEE. https://doi.org/10.1109/re48521.2020.00014","bibtex":"@inproceedings{Holtmann_Steghofer_Rath_Schmelter_2020, title={Cutting through the Jungle: Disambiguating Model-based Traceability Terminology}, DOI={10.1109/re48521.2020.00014}, booktitle={2020 IEEE 28th International Requirements Engineering Conference (RE)}, publisher={IEEE}, author={Holtmann, Jörg and Steghofer, Jan-Philipp and Rath, Michael and Schmelter, David}, year={2020} }","mla":"Holtmann, Jörg, et al. “Cutting through the Jungle: Disambiguating Model-Based Traceability Terminology.” 2020 IEEE 28th International Requirements Engineering Conference (RE), IEEE, 2020, doi:10.1109/re48521.2020.00014.","short":"J. Holtmann, J.-P. Steghofer, M. Rath, D. Schmelter, in: 2020 IEEE 28th International Requirements Engineering Conference (RE), IEEE, 2020.","ieee":"J. Holtmann, J.-P. Steghofer, M. Rath, and D. Schmelter, “Cutting through the Jungle: Disambiguating Model-based Traceability Terminology,” in 2020 IEEE 28th International Requirements Engineering Conference (RE), 2020."},"language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:54:29Z","_id":"20516","doi":"10.1109/re48521.2020.00014","publisher":"IEEE","author":[{"id":"3875","last_name":"Holtmann","full_name":"Holtmann, Jörg","orcid":"0000-0001-6141-4571","first_name":"Jörg"},{"full_name":"Steghofer, Jan-Philipp","first_name":"Jan-Philipp","last_name":"Steghofer"},{"first_name":"Michael","full_name":"Rath, Michael","last_name":"Rath"},{"last_name":"Schmelter","id":"40982","first_name":"David","orcid":"0000-0001-7787-5380","full_name":"Schmelter, David"}],"department":[{"_id":"241"},{"_id":"662"}],"publication":"2020 IEEE 28th International Requirements Engineering Conference (RE)","publication_status":"published","publication_identifier":{"isbn":["9781728174389"]},"status":"public","date_created":"2020-11-26T10:14:24Z","abstract":[{"text":"Traceability, a classic requirements engineering topic, is increasingly used in the context of model-based engineering. However, researchers and practitioners lack a concise terminology to discuss aspects of requirements traceability in situations in which engineers heavily rely on models and model-based engineering. While others have previously surveyed the domain, no one has so far provided a clear, unambiguous set of terms that can be used to discuss traceability in such a context. We therefore set out to cut a path through the jungle of terminology for model-based traceability, ground it in established terminology from requirements engineering, and derive an unambiguous set of relevant terms. We also map the terminology used in existing primary and secondary studies to our taxonomy to show differences and commonalities. The contribution of this paper is thus a terminology for model-based traceability that allows requirements engineers and engineers working with models to unambiguously discuss their joint traceability efforts.","lang":"eng"}],"title":"Cutting through the Jungle: Disambiguating Model-based Traceability Terminology","user_id":"40982"},{"doi":"10.1145/3365438.3410946","date_updated":"2022-01-06T06:54:29Z","_id":"20518","citation":{"mla":"Koch, Thorsten, et al. “Scenario-Based Specification of Security Protocols and Transformation to Security Model Checkers.” ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20), ACM, 2020, doi:10.1145/3365438.3410946.","bibtex":"@inproceedings{Koch_Dziwok_Holtmann_Bodden_2020, title={Scenario-based Specification of Security Protocols and Transformation to Security Model Checkers}, DOI={10.1145/3365438.3410946}, booktitle={ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20)}, publisher={ACM}, author={Koch, Thorsten and Dziwok, Stefan and Holtmann, Jörg and Bodden, Eric}, year={2020} }","chicago":"Koch, Thorsten, Stefan Dziwok, Jörg Holtmann, and Eric Bodden. “Scenario-Based Specification of Security Protocols and Transformation to Security Model Checkers.” In ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20). ACM, 2020. https://doi.org/10.1145/3365438.3410946.","ama":"Koch T, Dziwok S, Holtmann J, Bodden E. Scenario-based Specification of Security Protocols and Transformation to Security Model Checkers. In: ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20). ACM; 2020. doi:10.1145/3365438.3410946","apa":"Koch, T., Dziwok, S., Holtmann, J., & Bodden, E. (2020). Scenario-based Specification of Security Protocols and Transformation to Security Model Checkers. ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20). https://doi.org/10.1145/3365438.3410946","ieee":"T. Koch, S. Dziwok, J. Holtmann, and E. Bodden, “Scenario-based Specification of Security Protocols and Transformation to Security Model Checkers,” 2020, doi: 10.1145/3365438.3410946.","short":"T. Koch, S. Dziwok, J. Holtmann, E. Bodden, in: ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20), ACM, 2020."},"year":"2020","type":"conference","language":[{"iso":"eng"}],"title":"Scenario-based Specification of Security Protocols and Transformation to Security Model Checkers","user_id":"5786","date_created":"2020-11-26T10:19:54Z","status":"public","publication":"ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20)","department":[{"_id":"76"},{"_id":"241"},{"_id":"662"}],"author":[{"last_name":"Koch","id":"13616","first_name":"Thorsten","full_name":"Koch, Thorsten"},{"first_name":"Stefan","full_name":"Dziwok, Stefan","orcid":"http://orcid.org/0000-0002-8679-6673","last_name":"Dziwok","id":"3901"},{"first_name":"Jörg","orcid":"0000-0001-6141-4571","full_name":"Holtmann, Jörg","last_name":"Holtmann","id":"3875"},{"full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","first_name":"Eric","id":"59256","last_name":"Bodden"}],"publisher":"ACM"},{"_id":"23376","date_updated":"2022-01-06T06:55:50Z","doi":"10.1109/ase.2019.00110","language":[{"iso":"eng"}],"citation":{"mla":"Piskachev, Goran, et al. “SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods.” 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2020, doi:10.1109/ase.2019.00110.","bibtex":"@inproceedings{Piskachev_Nguyen Quang Do_Johnson_Bodden_2020, title={SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods}, DOI={10.1109/ase.2019.00110}, booktitle={2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)}, author={Piskachev, Goran and Nguyen Quang Do, Lisa and Johnson, Oshando and Bodden, Eric}, year={2020} }","apa":"Piskachev, G., Nguyen Quang Do, L., Johnson, O., & Bodden, E. (2020). SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods. 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE). https://doi.org/10.1109/ase.2019.00110","ama":"Piskachev G, Nguyen Quang Do L, Johnson O, Bodden E. SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods. In: 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE). ; 2020. doi:10.1109/ase.2019.00110","chicago":"Piskachev, Goran, Lisa Nguyen Quang Do, Oshando Johnson, and Eric Bodden. “SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods.” In 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2020. https://doi.org/10.1109/ase.2019.00110.","ieee":"G. Piskachev, L. Nguyen Quang Do, O. Johnson, and E. Bodden, “SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods,” 2020, doi: 10.1109/ase.2019.00110.","short":"G. Piskachev, L. Nguyen Quang Do, O. Johnson, E. Bodden, in: 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2020."},"year":"2020","type":"conference","user_id":"5786","title":"SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods","author":[{"first_name":"Goran","full_name":"Piskachev, Goran","last_name":"Piskachev"},{"full_name":"Nguyen Quang Do, Lisa","first_name":"Lisa","last_name":"Nguyen Quang Do"},{"first_name":"Oshando","full_name":"Johnson, Oshando","last_name":"Johnson"},{"last_name":"Bodden","first_name":"Eric","full_name":"Bodden, Eric"}],"publication":"2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)","department":[{"_id":"241"},{"_id":"662"},{"_id":"76"}],"status":"public","date_created":"2021-08-09T12:03:30Z","publication_status":"published"},{"_id":"23377","date_updated":"2022-01-06T06:55:50Z","doi":"10.1007/978-3-030-54997-8_34","year":"2020","type":"book_chapter","citation":{"bibtex":"@inbook{Piskachev_Petrasch_Späth_Bodden_2020, place={Cham}, title={AuthCheck: Program-State Analysis for Access-Control Vulnerabilities}, DOI={10.1007/978-3-030-54997-8_34}, booktitle={Lecture Notes in Computer Science}, author={Piskachev, Goran and Petrasch, Tobias and Späth, Johannes and Bodden, Eric}, year={2020} }","mla":"Piskachev, Goran, et al. “AuthCheck: Program-State Analysis for Access-Control Vulnerabilities.” Lecture Notes in Computer Science, 2020, doi:10.1007/978-3-030-54997-8_34.","apa":"Piskachev, G., Petrasch, T., Späth, J., & Bodden, E. (2020). AuthCheck: Program-State Analysis for Access-Control Vulnerabilities. In Lecture Notes in Computer Science. https://doi.org/10.1007/978-3-030-54997-8_34","ama":"Piskachev G, Petrasch T, Späth J, Bodden E. AuthCheck: Program-State Analysis for Access-Control Vulnerabilities. In: Lecture Notes in Computer Science. ; 2020. doi:10.1007/978-3-030-54997-8_34","chicago":"Piskachev, Goran, Tobias Petrasch, Johannes Späth, and Eric Bodden. “AuthCheck: Program-State Analysis for Access-Control Vulnerabilities.” In Lecture Notes in Computer Science. Cham, 2020. https://doi.org/10.1007/978-3-030-54997-8_34.","ieee":"G. Piskachev, T. Petrasch, J. Späth, and E. Bodden, “AuthCheck: Program-State Analysis for Access-Control Vulnerabilities,” in Lecture Notes in Computer Science, Cham, 2020.","short":"G. Piskachev, T. Petrasch, J. Späth, E. Bodden, in: Lecture Notes in Computer Science, Cham, 2020."},"language":[{"iso":"eng"}],"place":"Cham","title":"AuthCheck: Program-State Analysis for Access-Control Vulnerabilities","user_id":"5786","author":[{"last_name":"Piskachev","first_name":"Goran","full_name":"Piskachev, Goran"},{"full_name":"Petrasch, Tobias","first_name":"Tobias","last_name":"Petrasch"},{"full_name":"Späth, Johannes","first_name":"Johannes","last_name":"Späth"},{"last_name":"Bodden","full_name":"Bodden, Eric","first_name":"Eric"}],"publication":"Lecture Notes in Computer Science","department":[{"_id":"241"},{"_id":"662"},{"_id":"76"}],"publication_identifier":{"issn":["0302-9743","1611-3349"]},"publication_status":"published","status":"public","date_created":"2021-08-09T12:05:09Z"},{"user_id":"13616","title":"Softwareentwicklung wie am Fliessband","status":"public","date_created":"2021-04-30T11:15:13Z","editor":[{"full_name":"Felderer, Michael","first_name":"Michael","last_name":"Felderer"},{"first_name":"Wilhelm","full_name":"Hasselbring, Wilhelm","last_name":"Hasselbring"},{"first_name":"Rick","full_name":"Rabiser, Rick","last_name":"Rabiser"},{"last_name":"Jung","full_name":"Jung, Reiner","first_name":"Reiner"}],"publisher":"Gesellschaft für Informatik e.V.","author":[{"first_name":"Thorsten","full_name":"Koch, Thorsten","last_name":"Koch","id":"13616"},{"full_name":"Meyer, Matthias","first_name":"Matthias","id":"683","last_name":"Meyer"},{"last_name":"Fazal-Baqaie","first_name":"Masud","full_name":"Fazal-Baqaie, Masud"},{"last_name":"Runschke","full_name":"Runschke, Hubert","first_name":"Hubert"}],"department":[{"_id":"241"},{"_id":"662"}],"publication":"Software Engineering 2020 (SE 2020)","doi":"10.18420/SE2020\\_58","_id":"21931","date_updated":"2022-01-06T06:55:19Z","language":[{"iso":"eng"}],"year":"2020","citation":{"chicago":"Koch, Thorsten, Matthias Meyer, Masud Fazal-Baqaie, and Hubert Runschke. “Softwareentwicklung Wie Am Fliessband.” In Software Engineering 2020 (SE 2020), edited by Michael Felderer, Wilhelm Hasselbring, Rick Rabiser, and Reiner Jung. Lecture Notes in Informatics (LNI). Gesellschaft für Informatik e.V., 2020. https://doi.org/10.18420/SE2020\\_58.","apa":"Koch, T., Meyer, M., Fazal-Baqaie, M., & Runschke, H. (2020). Softwareentwicklung wie am Fliessband. In M. Felderer, W. Hasselbring, R. Rabiser, & R. Jung (Eds.), Software Engineering 2020 (SE 2020). Gesellschaft für Informatik e.V. https://doi.org/10.18420/SE2020\\_58","ama":"Koch T, Meyer M, Fazal-Baqaie M, Runschke H. Softwareentwicklung wie am Fliessband. In: Felderer M, Hasselbring W, Rabiser R, Jung R, eds. Software Engineering 2020 (SE 2020). Lecture Notes in Informatics (LNI). Gesellschaft für Informatik e.V.; 2020. doi:10.18420/SE2020\\_58","bibtex":"@inproceedings{Koch_Meyer_Fazal-Baqaie_Runschke_2020, series={Lecture Notes in Informatics (LNI)}, title={Softwareentwicklung wie am Fliessband}, DOI={10.18420/SE2020\\_58}, booktitle={Software Engineering 2020 (SE 2020)}, publisher={Gesellschaft für Informatik e.V.}, author={Koch, Thorsten and Meyer, Matthias and Fazal-Baqaie, Masud and Runschke, Hubert}, editor={Felderer, Michael and Hasselbring, Wilhelm and Rabiser, Rick and Jung, ReinerEditors}, year={2020}, collection={Lecture Notes in Informatics (LNI)} }","mla":"Koch, Thorsten, et al. “Softwareentwicklung Wie Am Fliessband.” Software Engineering 2020 (SE 2020), edited by Michael Felderer et al., Gesellschaft für Informatik e.V., 2020, doi:10.18420/SE2020\\_58.","short":"T. Koch, M. Meyer, M. Fazal-Baqaie, H. Runschke, in: M. Felderer, W. Hasselbring, R. Rabiser, R. Jung (Eds.), Software Engineering 2020 (SE 2020), Gesellschaft für Informatik e.V., 2020.","ieee":"T. Koch, M. Meyer, M. Fazal-Baqaie, and H. Runschke, “Softwareentwicklung wie am Fliessband,” in Software Engineering 2020 (SE 2020), 2020."},"type":"conference","series_title":"Lecture Notes in Informatics (LNI)"},{"date_updated":"2022-01-06T06:54:36Z","_id":"20757","language":[{"iso":"eng"}],"citation":{"bibtex":"@inproceedings{Fazal-Baqaie_Strüwer_Schmelter_Dziwok_2019, title={Coaching on the Job bei Unternehmen des Maschinen- und Anlagenbaus - Wissenslücken schließen zur Weiterpflege modernisierter IT-Anwendungen}, booktitle={Projektmanagement und Vorgehensmodelle 2019 (PVM 2019)}, publisher={Lecture Notes in Informatics (LNI)}, author={Fazal-Baqaie, Masud and Strüwer, Jan-Niclas and Schmelter, David and Dziwok, Stefan}, editor={Mikusz, Martin}, year={2019} }","mla":"Fazal-Baqaie, Masud, et al. “Coaching on the Job Bei Unternehmen Des Maschinen- Und Anlagenbaus - Wissenslücken Schließen Zur Weiterpflege Modernisierter IT-Anwendungen.” Projektmanagement Und Vorgehensmodelle 2019 (PVM 2019), edited by Martin Mikusz, Lecture Notes in Informatics (LNI), 2019.","ama":"Fazal-Baqaie M, Strüwer J-N, Schmelter D, Dziwok S. Coaching on the Job bei Unternehmen des Maschinen- und Anlagenbaus - Wissenslücken schließen zur Weiterpflege modernisierter IT-Anwendungen. In: Mikusz M, ed. Projektmanagement Und Vorgehensmodelle 2019 (PVM 2019). Lecture Notes in Informatics (LNI); 2019.","apa":"Fazal-Baqaie, M., Strüwer, J.-N., Schmelter, D., & Dziwok, S. (2019). Coaching on the Job bei Unternehmen des Maschinen- und Anlagenbaus - Wissenslücken schließen zur Weiterpflege modernisierter IT-Anwendungen. In M. Mikusz (Ed.), Projektmanagement und Vorgehensmodelle 2019 (PVM 2019). Lecture Notes in Informatics (LNI).","chicago":"Fazal-Baqaie, Masud, Jan-Niclas Strüwer, David Schmelter, and Stefan Dziwok. “Coaching on the Job Bei Unternehmen Des Maschinen- Und Anlagenbaus - Wissenslücken Schließen Zur Weiterpflege Modernisierter IT-Anwendungen.” In Projektmanagement Und Vorgehensmodelle 2019 (PVM 2019), edited by Martin Mikusz. Lecture Notes in Informatics (LNI), 2019.","ieee":"M. Fazal-Baqaie, J.-N. Strüwer, D. Schmelter, and S. Dziwok, “Coaching on the Job bei Unternehmen des Maschinen- und Anlagenbaus - Wissenslücken schließen zur Weiterpflege modernisierter IT-Anwendungen,” in Projektmanagement und Vorgehensmodelle 2019 (PVM 2019), 2019.","short":"M. Fazal-Baqaie, J.-N. Strüwer, D. Schmelter, S. Dziwok, in: M. Mikusz (Ed.), Projektmanagement Und Vorgehensmodelle 2019 (PVM 2019), Lecture Notes in Informatics (LNI), 2019."},"year":"2019","type":"conference","user_id":"3901","title":"Coaching on the Job bei Unternehmen des Maschinen- und Anlagenbaus - Wissenslücken schließen zur Weiterpflege modernisierter IT-Anwendungen","publication":"Projektmanagement und Vorgehensmodelle 2019 (PVM 2019)","department":[{"_id":"241"},{"_id":"662"}],"author":[{"first_name":"Masud","full_name":"Fazal-Baqaie, Masud","last_name":"Fazal-Baqaie"},{"last_name":"Strüwer","full_name":"Strüwer, Jan-Niclas","first_name":"Jan-Niclas"},{"first_name":"David","orcid":"0000-0001-7787-5380","full_name":"Schmelter, David","last_name":"Schmelter","id":"40982"},{"id":"3901","last_name":"Dziwok","full_name":"Dziwok, Stefan","orcid":"http://orcid.org/0000-0002-8679-6673","first_name":"Stefan"}],"publisher":"Lecture Notes in Informatics (LNI)","date_created":"2020-12-16T13:51:04Z","status":"public","editor":[{"last_name":"Mikusz","full_name":"Mikusz, Martin","first_name":"Martin"}]},{"series_title":"Communications in Computer and Information Science","language":[{"iso":"eng"}],"year":"2019","citation":{"short":"M. Fockel, S. Merschjohann, M. Fazal-Baqaie, T. Förder, S. Hausmann, B. Waldeck, in: European System, Software & Service Process Improvement & Innovation Conference (EuroSPI 2019), 2019.","ieee":"M. Fockel, S. Merschjohann, M. Fazal-Baqaie, T. Förder, S. Hausmann, and B. Waldeck, “Designing and Integrating IEC 62443 Compliant Threat Analysis,” in European System, Software & Service Process Improvement & Innovation Conference (EuroSPI 2019), Edinburgh, UK, 2019, vol. 1060.","chicago":"Fockel, Markus, Sven Merschjohann, Masud Fazal-Baqaie, Torsten Förder, Stefan Hausmann, and Boris Waldeck. “Designing and Integrating IEC 62443 Compliant Threat Analysis.” In European System, Software & Service Process Improvement & Innovation Conference (EuroSPI 2019), Vol. 1060. Communications in Computer and Information Science, 2019. https://doi.org/10.1007/978-3-030-28005-5_5.","apa":"Fockel, M., Merschjohann, S., Fazal-Baqaie, M., Förder, T., Hausmann, S., & Waldeck, B. (2019). Designing and Integrating IEC 62443 Compliant Threat Analysis. In European System, Software & Service Process Improvement & Innovation Conference (EuroSPI 2019) (Vol. 1060). Edinburgh, UK. https://doi.org/10.1007/978-3-030-28005-5_5","ama":"Fockel M, Merschjohann S, Fazal-Baqaie M, Förder T, Hausmann S, Waldeck B. Designing and Integrating IEC 62443 Compliant Threat Analysis. In: European System, Software & Service Process Improvement & Innovation Conference (EuroSPI 2019). Vol 1060. Communications in Computer and Information Science. ; 2019. doi:10.1007/978-3-030-28005-5_5","bibtex":"@inproceedings{Fockel_Merschjohann_Fazal-Baqaie_Förder_Hausmann_Waldeck_2019, series={Communications in Computer and Information Science}, title={Designing and Integrating IEC 62443 Compliant Threat Analysis}, volume={1060}, DOI={10.1007/978-3-030-28005-5_5}, booktitle={European System, Software & Service Process Improvement & Innovation Conference (EuroSPI 2019)}, author={Fockel, Markus and Merschjohann, Sven and Fazal-Baqaie, Masud and Förder, Torsten and Hausmann, Stefan and Waldeck, Boris}, year={2019}, collection={Communications in Computer and Information Science} }","mla":"Fockel, Markus, et al. “Designing and Integrating IEC 62443 Compliant Threat Analysis.” European System, Software & Service Process Improvement & Innovation Conference (EuroSPI 2019), vol. 1060, 2019, doi:10.1007/978-3-030-28005-5_5."},"type":"conference","conference":{"name":"European System, Software & Service Process Improvement & Innovation Conference (EuroSPI 2019)","location":"Edinburgh, UK"},"_id":"22805","intvolume":" 1060","date_updated":"2022-01-06T06:55:41Z","doi":"10.1007/978-3-030-28005-5_5","publication":"European System, Software & Service Process Improvement & Innovation Conference (EuroSPI 2019)","department":[{"_id":"241"},{"_id":"662"}],"author":[{"full_name":"Fockel, Markus","orcid":"0000-0002-1269-0702","first_name":"Markus","id":"8472","last_name":"Fockel"},{"full_name":"Merschjohann, Sven","first_name":"Sven","id":"11394","last_name":"Merschjohann"},{"last_name":"Fazal-Baqaie","first_name":"Masud","full_name":"Fazal-Baqaie, Masud"},{"last_name":"Förder","first_name":"Torsten","full_name":"Förder, Torsten"},{"first_name":"Stefan","full_name":"Hausmann, Stefan","last_name":"Hausmann"},{"first_name":"Boris","full_name":"Waldeck, Boris","last_name":"Waldeck"}],"date_created":"2021-07-23T14:09:56Z","status":"public","publication_identifier":{"issn":["1865-0929","1865-0937"]},"publication_status":"published","volume":1060,"user_id":"8472","title":"Designing and Integrating IEC 62443 Compliant Threat Analysis"},{"doi":"10.1145/3293882.3330556","date_updated":"2022-01-06T06:55:50Z","_id":"23378","language":[{"iso":"eng"}],"citation":{"chicago":"Piskachev, Goran, Lisa Nguyen Quang Do, and Eric Bodden. “Codebase-Adaptive Detection of Security-Relevant Methods.” In Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019. https://doi.org/10.1145/3293882.3330556.","apa":"Piskachev, G., Do, L. N. Q., & Bodden, E. (2019). Codebase-adaptive detection of security-relevant methods. Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. https://doi.org/10.1145/3293882.3330556","ama":"Piskachev G, Do LNQ, Bodden E. Codebase-adaptive detection of security-relevant methods. In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. ; 2019. doi:10.1145/3293882.3330556","mla":"Piskachev, Goran, et al. “Codebase-Adaptive Detection of Security-Relevant Methods.” Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019, doi:10.1145/3293882.3330556.","bibtex":"@inproceedings{Piskachev_Do_Bodden_2019, title={Codebase-adaptive detection of security-relevant methods}, DOI={10.1145/3293882.3330556}, booktitle={Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis}, author={Piskachev, Goran and Do, Lisa Nguyen Quang and Bodden, Eric}, year={2019} }","short":"G. Piskachev, L.N.Q. Do, E. Bodden, in: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019.","ieee":"G. Piskachev, L. N. Q. Do, and E. Bodden, “Codebase-adaptive detection of security-relevant methods,” 2019, doi: 10.1145/3293882.3330556."},"type":"conference","year":"2019","user_id":"5786","title":"Codebase-adaptive detection of security-relevant methods","date_created":"2021-08-09T12:06:52Z","status":"public","publication_status":"published","department":[{"_id":"241"},{"_id":"662"},{"_id":"76"}],"publication":"Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis","author":[{"first_name":"Goran","full_name":"Piskachev, Goran","last_name":"Piskachev"},{"last_name":"Do","full_name":"Do, Lisa Nguyen Quang","first_name":"Lisa Nguyen Quang"},{"last_name":"Bodden","first_name":"Eric","full_name":"Bodden, Eric"}]},{"department":[{"_id":"241"},{"_id":"662"}],"publication":"Projektmanagement und Vorgehensmodelle 2019 (PVM 2019)","publisher":"Gesellschaft für Informatik e.V.","author":[{"last_name":"Altemeier","full_name":"Altemeier, Katharina","first_name":"Katharina"},{"first_name":"Matthias","full_name":"Becker, Matthias","last_name":"Becker"},{"full_name":"Dziwok, Stefan","orcid":"http://orcid.org/0000-0002-8679-6673","first_name":"Stefan","id":"3901","last_name":"Dziwok"},{"id":"13616","last_name":"Koch","full_name":"Koch, Thorsten","first_name":"Thorsten"},{"last_name":"Merschjohann","id":"11394","first_name":"Sven","full_name":"Merschjohann, Sven"}],"date_created":"2021-04-30T10:55:34Z","status":"public","editor":[{"first_name":"Martin","full_name":"Mikusz, Martin","last_name":"Mikusz"}],"user_id":"13616","title":"Was fehlt (bisher) um Apps sicher zu entwickeln? - Prozesse, Werkzeuge und Schulungen für sichere Apps by Design","series_title":"Lecture Notes in Informatics (LNI)","language":[{"iso":"eng"}],"type":"conference","citation":{"mla":"Altemeier, Katharina, et al. “Was Fehlt (Bisher) Um Apps Sicher Zu Entwickeln? - Prozesse, Werkzeuge Und Schulungen Für Sichere Apps by Design.” Projektmanagement Und Vorgehensmodelle 2019 (PVM 2019), edited by Martin Mikusz, Gesellschaft für Informatik e.V., 2019.","bibtex":"@inproceedings{Altemeier_Becker_Dziwok_Koch_Merschjohann_2019, series={Lecture Notes in Informatics (LNI)}, title={Was fehlt (bisher) um Apps sicher zu entwickeln? - Prozesse, Werkzeuge und Schulungen für sichere Apps by Design}, booktitle={Projektmanagement und Vorgehensmodelle 2019 (PVM 2019)}, publisher={Gesellschaft für Informatik e.V.}, author={Altemeier, Katharina and Becker, Matthias and Dziwok, Stefan and Koch, Thorsten and Merschjohann, Sven}, editor={Mikusz, MartinEditor}, year={2019}, collection={Lecture Notes in Informatics (LNI)} }","chicago":"Altemeier, Katharina, Matthias Becker, Stefan Dziwok, Thorsten Koch, and Sven Merschjohann. “Was Fehlt (Bisher) Um Apps Sicher Zu Entwickeln? - Prozesse, Werkzeuge Und Schulungen Für Sichere Apps by Design.” In Projektmanagement Und Vorgehensmodelle 2019 (PVM 2019), edited by Martin Mikusz. Lecture Notes in Informatics (LNI). Gesellschaft für Informatik e.V., 2019.","apa":"Altemeier, K., Becker, M., Dziwok, S., Koch, T., & Merschjohann, S. (2019). Was fehlt (bisher) um Apps sicher zu entwickeln? - Prozesse, Werkzeuge und Schulungen für sichere Apps by Design. In M. Mikusz (Ed.), Projektmanagement und Vorgehensmodelle 2019 (PVM 2019). Gesellschaft für Informatik e.V.","ama":"Altemeier K, Becker M, Dziwok S, Koch T, Merschjohann S. Was fehlt (bisher) um Apps sicher zu entwickeln? - Prozesse, Werkzeuge und Schulungen für sichere Apps by Design. In: Mikusz M, ed. Projektmanagement Und Vorgehensmodelle 2019 (PVM 2019). Lecture Notes in Informatics (LNI). Gesellschaft für Informatik e.V.; 2019.","ieee":"K. Altemeier, M. Becker, S. Dziwok, T. Koch, and S. Merschjohann, “Was fehlt (bisher) um Apps sicher zu entwickeln? - Prozesse, Werkzeuge und Schulungen für sichere Apps by Design,” in Projektmanagement und Vorgehensmodelle 2019 (PVM 2019), 2019.","short":"K. Altemeier, M. Becker, S. Dziwok, T. Koch, S. Merschjohann, in: M. Mikusz (Ed.), Projektmanagement Und Vorgehensmodelle 2019 (PVM 2019), Gesellschaft für Informatik e.V., 2019."},"year":"2019","_id":"21929","date_updated":"2022-01-06T06:55:19Z"},{"language":[{"iso":"eng"}],"supervisor":[{"first_name":"Eric","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","last_name":"Bodden","id":"59256"}],"year":"2018","citation":{"short":"M. Fockel, Safety Requirements Engineering for Early SIL Tailoring, Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn, 2018.","ieee":"M. Fockel, Safety Requirements Engineering for Early SIL Tailoring. Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn, 2018.","apa":"Fockel, M. (2018). Safety Requirements Engineering for Early SIL Tailoring. Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn. https://doi.org/10.17619/UNIPB/1-490","ama":"Fockel M. Safety Requirements Engineering for Early SIL Tailoring. Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn; 2018. doi:10.17619/UNIPB/1-490","chicago":"Fockel, Markus. Safety Requirements Engineering for Early SIL Tailoring. Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn, 2018. https://doi.org/10.17619/UNIPB/1-490.","mla":"Fockel, Markus. Safety Requirements Engineering for Early SIL Tailoring. Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn, 2018, doi:10.17619/UNIPB/1-490.","bibtex":"@book{Fockel_2018, title={Safety Requirements Engineering for Early SIL Tailoring}, DOI={10.17619/UNIPB/1-490}, publisher={Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn}, author={Fockel, Markus}, year={2018} }"},"type":"dissertation","doi":"10.17619/UNIPB/1-490","_id":"20779","date_updated":"2022-01-06T06:54:38Z","status":"public","date_created":"2020-12-17T11:59:05Z","author":[{"id":"8472","last_name":"Fockel","full_name":"Fockel, Markus","orcid":"0000-0002-1269-0702","first_name":"Markus"}],"publisher":"Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn","department":[{"_id":"76"},{"_id":"241"},{"_id":"662"}],"user_id":"5786","title":"Safety Requirements Engineering for Early SIL Tailoring","abstract":[{"text":"Der hohe Grad an Innovation in mechatronischen Systemen führt zu sogenannten Cyber-Physical Systems (CPS). Diese haben eine komplexe Funktionalität und Kommunikation. Wie sicherheitskritisch solche Systeme sind, wird durch sogenannte Sicherheits-Integritätslevel (SIL) kategorisiert, die durch Normen wie der ISO 26262 definiert werden. Ein bestimmter SIL beschreibt nicht nur die Höhe des Gefährdungsrisikos, sondern diktiert auch den erforderlichen Grad an Sorgfalt bei der Entwicklung des Systems. Ein hoher SIL erfordert die Anwendung von Safety-Maßnahmen mit einem hohen Sorgfaltsgrad in allen Phasen der Entwicklung und impliziert daher einen hohen Safety-Aufwand. SIL-Tailoring ist ein Mittel um den Safety-Aufwand zu reduzieren, indem man Subsystemen geringere SILs zuordnet, falls sie von kritischeren Subsystemen getrennt sind oder redundante Safety-Anforderungen erfüllen. Um den nötigen Safety-Aufwand zu planen, sollten Möglichkeiten für SIL-Tailoring so früh wie möglich identifiziert werden - d.h. bereits in der Anforderungsanalyse. Durch die Komplexität von CPS, ist es schwierig valide SIL-Tailorings zu finden. Die Validität von SIL-Tailorings muss durch Analyse von Fehlerpropagierungspfaden geprüft und durch Argumente im Safety Case begründet werden. Der Beitrag dieser Dissertation ist ein systematischer, tool-unterstützter SIL-Tailoring-Prozess, der im Safety Requirements Engineering angewendet wird. Der Prozess nutzt eine modell-basierte, formale Anforderungsspezifikation und stellt einen Katalog von Anforderungsmustern bereit. Basierend auf diesen Anforderungen werden Fehlerpropagierungsmodelle generiert und Subsystemen automatisch SILs zugeordnet. Das minimiert den Sicherheitsanalyseaufwand. Aus den generierten Ergebnissen wird automatisch ein Safety Case mit Argumenten für die SIL-Tailoring-Validität abgeleitet.","lang":"eng"}]},{"status":"public","date_created":"2020-12-17T12:00:45Z","author":[{"id":"8472","last_name":"Fockel","orcid":"0000-0002-1269-0702","full_name":"Fockel, Markus","first_name":"Markus"},{"last_name":"Merschjohann","id":"11394","first_name":"Sven","full_name":"Merschjohann, Sven"},{"last_name":"Fazal-Baqaie","full_name":"Fazal-Baqaie, Masud","first_name":"Masud"}],"publisher":"Springer Nature Switzerland AG","department":[{"_id":"241"},{"_id":"662"}],"publication":"19th International Conference on Product-Focused Software Process Improvement (PROFES 2018)","title":"Threat Analysis in Practice - Systematically Deriving Security Requirements","user_id":"8472","abstract":[{"lang":"eng","text":"With the growing number of incidents, the topic security gains more and more attention across all domains. Organizations realize their lack of state-of-the-art security practices, however, they struggle to improve their software lifecycle in terms of security. In this talk, we introduce the concept of security by design that implements security practices within the whole software lifecycle. Based on our practical experience from industry projects in the regulated industrial automation and unregulated classical IT domain, we explain how to perform a threat analysis and how to integrate it into the software lifecycle."}],"year":"2018","citation":{"short":"M. Fockel, S. Merschjohann, M. Fazal-Baqaie, in: 19th International Conference on Product-Focused Software Process Improvement (PROFES 2018), Springer Nature Switzerland AG, 2018.","ieee":"M. Fockel, S. Merschjohann, and M. Fazal-Baqaie, “Threat Analysis in Practice - Systematically Deriving Security Requirements,” in 19th International Conference on Product-Focused Software Process Improvement (PROFES 2018), 2018.","ama":"Fockel M, Merschjohann S, Fazal-Baqaie M. Threat Analysis in Practice - Systematically Deriving Security Requirements. In: 19th International Conference on Product-Focused Software Process Improvement (PROFES 2018). LNCS 11271. Springer Nature Switzerland AG; 2018. doi:10.1007/978-3-030-03673-7_25","apa":"Fockel, M., Merschjohann, S., & Fazal-Baqaie, M. (2018). Threat Analysis in Practice - Systematically Deriving Security Requirements. In 19th International Conference on Product-Focused Software Process Improvement (PROFES 2018). Springer Nature Switzerland AG. https://doi.org/10.1007/978-3-030-03673-7_25","chicago":"Fockel, Markus, Sven Merschjohann, and Masud Fazal-Baqaie. “Threat Analysis in Practice - Systematically Deriving Security Requirements.” In 19th International Conference on Product-Focused Software Process Improvement (PROFES 2018). LNCS 11271. Springer Nature Switzerland AG, 2018. https://doi.org/10.1007/978-3-030-03673-7_25.","bibtex":"@inproceedings{Fockel_Merschjohann_Fazal-Baqaie_2018, series={LNCS 11271}, title={Threat Analysis in Practice - Systematically Deriving Security Requirements}, DOI={10.1007/978-3-030-03673-7_25}, booktitle={19th International Conference on Product-Focused Software Process Improvement (PROFES 2018)}, publisher={Springer Nature Switzerland AG}, author={Fockel, Markus and Merschjohann, Sven and Fazal-Baqaie, Masud}, year={2018}, collection={LNCS 11271} }","mla":"Fockel, Markus, et al. “Threat Analysis in Practice - Systematically Deriving Security Requirements.” 19th International Conference on Product-Focused Software Process Improvement (PROFES 2018), Springer Nature Switzerland AG, 2018, doi:10.1007/978-3-030-03673-7_25."},"type":"conference","language":[{"iso":"eng"}],"series_title":"LNCS 11271","doi":"10.1007/978-3-030-03673-7_25","_id":"20780","date_updated":"2022-01-06T06:54:38Z"},{"abstract":[{"lang":"eng","text":"Original equipment manufacturers (OEMs) build mechatronic, variant-rich systems using components from several suppliers in industry sectors like automation. The OEMs have to integrate the different components to the overall system based on a virtual layout. For this purpose, the suppliers provide geometrical information via the standardized exchange format STEP. Beyond the geometrical information, the OEMs need additional logical and technical information for the integration task as well as the variant handling. For that reason, STEP provides an extension mechanism for extending and tailoring STEP to project-specific needs. However, extending STEP requires extending several capabilities of all involved tools, which prevents the project-specific utilization of the STEP extensions mechanism. In order to cope with this problem, we presented in previous work a model-driven approach enabling the flexible specification of STEP extensions and particularly the automatic derivation of the required capability extensions for two involved tools. Nevertheless, the OEMs still need to apply several engineering tools from different domains to consider logical as well as geometrical constraints between product variants. In this paper, we hence combine our previous approach with extended feature models that consider conventional logical and particularly geometrical information, thereby enabling a holistic product line engineering for mechatronic systems. By means of an automation production system example, we illustrate how OEMs can orchestrate their overall supply and development processes through the combination of both approaches."}],"user_id":"13616","publication":"Revised Selected Papers of the 5th International Conference on Model-Driven Engineering and Software Development","publisher":"Springer International Publishing","author":[{"full_name":"Koch, Thorsten","first_name":"Thorsten","id":"13616","last_name":"Koch"},{"last_name":"Holtmann","id":"3875","first_name":"Jörg","full_name":"Holtmann, Jörg","orcid":"0000-0001-6141-4571"},{"last_name":"Lindemann","first_name":"Timo","full_name":"Lindemann, Timo"}],"date_created":"2020-12-17T12:03:28Z","status":"public","volume":880,"intvolume":" 880","_id":"20782","page":"173-197","citation":{"ieee":"T. Koch, J. Holtmann, and T. Lindemann, “Model-Driven STEP Application Protocol Extensions Combined with Feature Modeling Considering Geometrical Information,” in Revised Selected Papers of the 5th International Conference on Model-Driven Engineering and Software Development, vol. 880, L. F. Pires, S. Hammoudi, and B. Selic, Eds. Springer International Publishing, 2018, pp. 173–197.","short":"T. Koch, J. Holtmann, T. Lindemann, in: L.F. Pires, S. Hammoudi, B. Selic (Eds.), Revised Selected Papers of the 5th International Conference on Model-Driven Engineering and Software Development, Springer International Publishing, 2018, pp. 173–197.","bibtex":"@inbook{Koch_Holtmann_Lindemann_2018, series={Communications in Computer and Information Science}, title={Model-Driven STEP Application Protocol Extensions Combined with Feature Modeling Considering Geometrical Information}, volume={880}, DOI={10.1007/978-3-319-94764-8_8}, booktitle={Revised Selected Papers of the 5th International Conference on Model-Driven Engineering and Software Development}, publisher={Springer International Publishing}, author={Koch, Thorsten and Holtmann, Jörg and Lindemann, Timo}, editor={Pires, Luís Ferreira and Hammoudi, Slimane and Selic, BranEditors}, year={2018}, pages={173–197}, collection={Communications in Computer and Information Science} }","mla":"Koch, Thorsten, et al. “Model-Driven STEP Application Protocol Extensions Combined with Feature Modeling Considering Geometrical Information.” Revised Selected Papers of the 5th International Conference on Model-Driven Engineering and Software Development, edited by Luís Ferreira Pires et al., vol. 880, Springer International Publishing, 2018, pp. 173–97, doi:10.1007/978-3-319-94764-8_8.","chicago":"Koch, Thorsten, Jörg Holtmann, and Timo Lindemann. “Model-Driven STEP Application Protocol Extensions Combined with Feature Modeling Considering Geometrical Information.” In Revised Selected Papers of the 5th International Conference on Model-Driven Engineering and Software Development, edited by Luís Ferreira Pires, Slimane Hammoudi, and Bran Selic, 880:173–97. Communications in Computer and Information Science. Springer International Publishing, 2018. https://doi.org/10.1007/978-3-319-94764-8_8.","ama":"Koch T, Holtmann J, Lindemann T. Model-Driven STEP Application Protocol Extensions Combined with Feature Modeling Considering Geometrical Information. In: Pires LF, Hammoudi S, Selic B, eds. Revised Selected Papers of the 5th International Conference on Model-Driven Engineering and Software Development. Vol 880. Communications in Computer and Information Science. Springer International Publishing; 2018:173-197. doi:10.1007/978-3-319-94764-8_8","apa":"Koch, T., Holtmann, J., & Lindemann, T. (2018). Model-Driven STEP Application Protocol Extensions Combined with Feature Modeling Considering Geometrical Information. In L. F. Pires, S. Hammoudi, & B. Selic (Eds.), Revised Selected Papers of the 5th International Conference on Model-Driven Engineering and Software Development (Vol. 880, pp. 173–197). Springer International Publishing. https://doi.org/10.1007/978-3-319-94764-8_8"},"type":"book_chapter","year":"2018","title":"Model-Driven STEP Application Protocol Extensions Combined with Feature Modeling Considering Geometrical Information","department":[{"_id":"241"},{"_id":"662"}],"editor":[{"full_name":"Pires, Luís Ferreira","first_name":"Luís Ferreira","last_name":"Pires"},{"first_name":"Slimane","full_name":"Hammoudi, Slimane","last_name":"Hammoudi"},{"last_name":"Selic","first_name":"Bran","full_name":"Selic, Bran"}],"date_updated":"2022-01-06T06:54:38Z","doi":"10.1007/978-3-319-94764-8_8","series_title":"Communications in Computer and Information Science","language":[{"iso":"eng"}]},{"date_updated":"2022-01-06T06:54:38Z","_id":"20783","type":"conference","citation":{"short":"T. Koch, in: International Workshop on Security for and by Model-Driven Engineering (SecureMDE 2018), 2018.","ieee":"T. Koch, “Towards Scenario-based Security Requirements Engineering for Cyber-Physical Systems,” in International Workshop on Security for and by Model-Driven Engineering (SecureMDE 2018), 2018.","chicago":"Koch, Thorsten. “Towards Scenario-Based Security Requirements Engineering for Cyber-Physical Systems.” In International Workshop on Security for and by Model-Driven Engineering (SecureMDE 2018), 2018.","ama":"Koch T. Towards Scenario-based Security Requirements Engineering for Cyber-Physical Systems. In: International Workshop on Security for and by Model-Driven Engineering (SecureMDE 2018). ; 2018.","apa":"Koch, T. (2018). Towards Scenario-based Security Requirements Engineering for Cyber-Physical Systems. In International Workshop on Security for and by Model-Driven Engineering (SecureMDE 2018).","mla":"Koch, Thorsten. “Towards Scenario-Based Security Requirements Engineering for Cyber-Physical Systems.” International Workshop on Security for and by Model-Driven Engineering (SecureMDE 2018), 2018.","bibtex":"@inproceedings{Koch_2018, title={Towards Scenario-based Security Requirements Engineering for Cyber-Physical Systems}, booktitle={International Workshop on Security for and by Model-Driven Engineering (SecureMDE 2018)}, author={Koch, Thorsten}, year={2018} }"},"year":"2018","language":[{"iso":"eng"}],"title":"Towards Scenario-based Security Requirements Engineering for Cyber-Physical Systems","user_id":"13616","author":[{"id":"13616","last_name":"Koch","full_name":"Koch, Thorsten","first_name":"Thorsten"}],"department":[{"_id":"241"},{"_id":"662"}],"publication":"International Workshop on Security for and by Model-Driven Engineering (SecureMDE 2018)","status":"public","date_created":"2020-12-17T12:05:35Z"},{"place":"Cham","title":"Automated Synthesis of a Real-Time Scheduling for Cyber-Physical Multi-core Systems","department":[{"_id":"76"},{"_id":"241"},{"_id":"662"}],"editor":[{"full_name":"Pires, Luís Ferreira","first_name":"Luís Ferreira","last_name":"Pires"},{"last_name":"Hammoudi","full_name":"Hammoudi, Slimane","first_name":"Slimane"},{"first_name":"Bran","full_name":"Selic, Bran","last_name":"Selic"}],"date_updated":"2022-01-06T06:54:38Z","doi":"10.1007/978-3-319-94764-8_4","language":[{"iso":"eng"}],"abstract":[{"text":"Cyber-physical Systems are distributed, embedded systems that interact with their physical environment. Typically, these systems consist of several Electronic Control Units using multiple processing cores for the execution. Many systems are applied in safety-critical contexts and have to fulfill hard real-time requirements. The model-driven engineering paradigm enables system developers to consider all requirements in a systematical manner. In the software design phase, they prove the fulfillment of the requirements using model checking. When deploying the software to the executing platform, one important task is to ensure that the runtime scheduling does not violate the verified requirements by neglecting the model checking assumptions. Current model-driven approaches do not consider the problem of deriving feasible execution schedules for embedded multi-core platforms respecting hard real-time requirements. This paper extends the previous work on providing an approach for a semi-automatic synthesis of behavioral models into a deterministic real-time scheduling. We add an approach for the partitioning and mapping development tasks. This extended approach enables the utilization of parallel resources within a single ECU considering the verification assumptions by extending the open tool platform App4mc. We evaluate our approach using an example of a distributed automotive system with hard real-time requirements specified with the MechatronicUML method.\r\n","lang":"eng"}],"user_id":"5786","author":[{"first_name":"Johannes","full_name":"Geismann, Johannes","orcid":"https://orcid.org/0000-0003-2015-2047","last_name":"Geismann","id":"20063"},{"last_name":"Höttger","first_name":"Robert","full_name":"Höttger, Robert"},{"last_name":"Krawczyk","first_name":"Lukas","full_name":"Krawczyk, Lukas"},{"first_name":"Uwe","full_name":"Pohlmann, Uwe","last_name":"Pohlmann"},{"id":"40982","last_name":"Schmelter","orcid":"0000-0001-7787-5380","full_name":"Schmelter, David","first_name":"David"}],"publisher":"Springer International Publishing","publication":"Model-Driven Engineering and Software Development","status":"public","date_created":"2020-12-17T12:07:52Z","volume":1,"_id":"20785","intvolume":" 1","citation":{"ieee":"J. Geismann, R. Höttger, L. Krawczyk, U. Pohlmann, and D. Schmelter, “Automated Synthesis of a Real-Time Scheduling for Cyber-Physical Multi-core Systems,” in Model-Driven Engineering and Software Development, 2018, vol. 1, pp. 72–93, doi: 10.1007/978-3-319-94764-8_4.","short":"J. Geismann, R. Höttger, L. Krawczyk, U. Pohlmann, D. Schmelter, in: L.F. Pires, S. Hammoudi, B. Selic (Eds.), Model-Driven Engineering and Software Development, Springer International Publishing, Cham, 2018, pp. 72–93.","mla":"Geismann, Johannes, et al. “Automated Synthesis of a Real-Time Scheduling for Cyber-Physical Multi-Core Systems.” Model-Driven Engineering and Software Development, edited by Luís Ferreira Pires et al., vol. 1, Springer International Publishing, 2018, pp. 72–93, doi:10.1007/978-3-319-94764-8_4.","bibtex":"@inproceedings{Geismann_Höttger_Krawczyk_Pohlmann_Schmelter_2018, place={Cham}, title={Automated Synthesis of a Real-Time Scheduling for Cyber-Physical Multi-core Systems}, volume={1}, DOI={10.1007/978-3-319-94764-8_4}, booktitle={Model-Driven Engineering and Software Development}, publisher={Springer International Publishing}, author={Geismann, Johannes and Höttger, Robert and Krawczyk, Lukas and Pohlmann, Uwe and Schmelter, David}, editor={Pires, Luís Ferreira and Hammoudi, Slimane and Selic, Bran}, year={2018}, pages={72–93} }","apa":"Geismann, J., Höttger, R., Krawczyk, L., Pohlmann, U., & Schmelter, D. (2018). Automated Synthesis of a Real-Time Scheduling for Cyber-Physical Multi-core Systems. In L. F. Pires, S. Hammoudi, & B. Selic (Eds.), Model-Driven Engineering and Software Development (Vol. 1, pp. 72–93). Springer International Publishing. https://doi.org/10.1007/978-3-319-94764-8_4","ama":"Geismann J, Höttger R, Krawczyk L, Pohlmann U, Schmelter D. Automated Synthesis of a Real-Time Scheduling for Cyber-Physical Multi-core Systems. In: Pires LF, Hammoudi S, Selic B, eds. Model-Driven Engineering and Software Development. Vol 1. Springer International Publishing; 2018:72-93. doi:10.1007/978-3-319-94764-8_4","chicago":"Geismann, Johannes, Robert Höttger, Lukas Krawczyk, Uwe Pohlmann, and David Schmelter. “Automated Synthesis of a Real-Time Scheduling for Cyber-Physical Multi-Core Systems.” In Model-Driven Engineering and Software Development, edited by Luís Ferreira Pires, Slimane Hammoudi, and Bran Selic, 1:72–93. Cham: Springer International Publishing, 2018. https://doi.org/10.1007/978-3-319-94764-8_4."},"type":"conference","year":"2018","page":"72-93"},{"language":[{"iso":"eng"}],"citation":{"ieee":"M. Fockel, J. Holtmann, T. Koch, and D. Schmelter, “Formal, Model- and Scenario-based Requirement Patterns,” in 6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018), 2018.","short":"M. Fockel, J. Holtmann, T. Koch, D. Schmelter, in: 6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018), 2018.","mla":"Fockel, Markus, et al. “Formal, Model- and Scenario-Based Requirement Patterns.” 6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018), 2018.","bibtex":"@inproceedings{Fockel_Holtmann_Koch_Schmelter_2018, title={Formal, Model- and Scenario-based Requirement Patterns}, booktitle={6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018)}, author={Fockel, Markus and Holtmann, Jörg and Koch, Thorsten and Schmelter, David}, year={2018} }","chicago":"Fockel, Markus, Jörg Holtmann, Thorsten Koch, and David Schmelter. “Formal, Model- and Scenario-Based Requirement Patterns.” In 6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018), 2018.","apa":"Fockel, M., Holtmann, J., Koch, T., & Schmelter, D. (2018). Formal, Model- and Scenario-based Requirement Patterns. In 6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018).","ama":"Fockel M, Holtmann J, Koch T, Schmelter D. Formal, Model- and Scenario-based Requirement Patterns. In: 6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018). ; 2018."},"type":"conference","year":"2018","date_updated":"2022-01-06T06:54:38Z","_id":"20786","status":"public","date_created":"2020-12-17T12:12:20Z","author":[{"first_name":"Markus","full_name":"Fockel, Markus","orcid":"0000-0002-1269-0702","last_name":"Fockel","id":"8472"},{"last_name":"Holtmann","id":"3875","first_name":"Jörg","full_name":"Holtmann, Jörg","orcid":"0000-0001-6141-4571"},{"id":"13616","last_name":"Koch","full_name":"Koch, Thorsten","first_name":"Thorsten"},{"first_name":"David","orcid":"0000-0001-7787-5380","full_name":"Schmelter, David","last_name":"Schmelter","id":"40982"}],"publication":"6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018)","department":[{"_id":"241"},{"_id":"662"}],"user_id":"8472","title":"Formal, Model- and Scenario-based Requirement Patterns","abstract":[{"text":"Distributed, software-intensive systems such as automotive electronic control units have to handle various situations employing message-based coordination. The growing complexity of such systems results in an increasing difficulty to achieve a high quality of the systems' requirements specifications. Scenario-based requirements engineering addresses the message-based coordination of such systems and enables, if underpinned with formal modeling languages, automatic analyses for ensuring the quality of requirements specifications. However, formal requirements modeling languages require high expertise of the requirements engineers and many manual iterations until specifications reach high quality. Patterns provide a constructive means for assembling high-quality solutions by applying reusable and established building blocks. Thus, they also gained momentum in requirements documentation. In order to support the requirements engineers in the systematic conception of formal, scenario-based requirements specification models, we hence introduce in this paper a requirement pattern catalog for a requirements modeling language. We illustrate and discuss the application of the requirement patterns with an example of requirements for an automotive electronic control unit.","lang":"eng"}]},{"title":"Improving Quality Control of Mechatronic Systems Using KPI-Based Statistical Process Control","user_id":"40982","date_created":"2020-12-17T12:13:56Z","status":"public","publication":"Advances in Manufacturing, Production Management and Process Control - AHFE 2018","department":[{"_id":"241"},{"_id":"662"}],"author":[{"first_name":"Benedict","full_name":"Wohlers, Benedict","last_name":"Wohlers","id":"53786"},{"last_name":"Dziwok","id":"3901","first_name":"Stefan","full_name":"Dziwok, Stefan","orcid":"http://orcid.org/0000-0002-8679-6673"},{"first_name":"David","orcid":"0000-0001-7787-5380","full_name":"Schmelter, David","last_name":"Schmelter","id":"40982"},{"full_name":"Lorenz, Wadim","first_name":"Wadim","last_name":"Lorenz"}],"date_updated":"2022-01-06T06:54:38Z","_id":"20787","page":"398-410","year":"2018","citation":{"short":"B. Wohlers, S. Dziwok, D. Schmelter, W. Lorenz, Advances in Manufacturing, Production Management and Process Control - AHFE 2018 (2018) 398–410.","ieee":"B. Wohlers, S. Dziwok, D. Schmelter, and W. Lorenz, “Improving Quality Control of Mechatronic Systems Using KPI-Based Statistical Process Control,” Advances in Manufacturing, Production Management and Process Control - AHFE 2018, pp. 398–410, 2018.","ama":"Wohlers B, Dziwok S, Schmelter D, Lorenz W. Improving Quality Control of Mechatronic Systems Using KPI-Based Statistical Process Control. Advances in Manufacturing, Production Management and Process Control - AHFE 2018. 2018:398-410.","apa":"Wohlers, B., Dziwok, S., Schmelter, D., & Lorenz, W. (2018). Improving Quality Control of Mechatronic Systems Using KPI-Based Statistical Process Control. Advances in Manufacturing, Production Management and Process Control - AHFE 2018, 398–410.","chicago":"Wohlers, Benedict, Stefan Dziwok, David Schmelter, and Wadim Lorenz. “Improving Quality Control of Mechatronic Systems Using KPI-Based Statistical Process Control.” Advances in Manufacturing, Production Management and Process Control - AHFE 2018, 2018, 398–410.","bibtex":"@article{Wohlers_Dziwok_Schmelter_Lorenz_2018, title={Improving Quality Control of Mechatronic Systems Using KPI-Based Statistical Process Control}, journal={Advances in Manufacturing, Production Management and Process Control - AHFE 2018}, author={Wohlers, Benedict and Dziwok, Stefan and Schmelter, David and Lorenz, Wadim}, year={2018}, pages={398–410} }","mla":"Wohlers, Benedict, et al. “Improving Quality Control of Mechatronic Systems Using KPI-Based Statistical Process Control.” Advances in Manufacturing, Production Management and Process Control - AHFE 2018, 2018, pp. 398–410."},"type":"journal_article","language":[{"iso":"eng"}],"main_file_link":[{"url":"https://link.springer.com/chapter/10.1007/978-3-319-94196-7_37"}]},{"_id":"20791","date_updated":"2022-01-06T06:54:38Z","language":[{"iso":"eng"}],"year":"2017","citation":{"apa":"Schmitz, J., & Fockel, M. (2017). Systemmodelle als Schlüssel zu durchgängigen XIL-Testszenarien. In Tag des Systems Engineering 2017. Gesellschaft f{\\\"u}r Systems Engineering e.V.","ama":"Schmitz J, Fockel M. Systemmodelle als Schlüssel zu durchgängigen XIL-Testszenarien. In: Tag Des Systems Engineering 2017. Gesellschaft f{\\\"u}r Systems Engineering e.V.; 2017.","chicago":"Schmitz, Joachim, and Markus Fockel. “Systemmodelle Als Schlüssel Zu Durchgängigen XIL-Testszenarien.” In Tag Des Systems Engineering 2017. Gesellschaft f{\\\"u}r Systems Engineering e.V., 2017.","mla":"Schmitz, Joachim, and Markus Fockel. “Systemmodelle Als Schlüssel Zu Durchgängigen XIL-Testszenarien.” Tag Des Systems Engineering 2017, Gesellschaft f{\\\"u}r Systems Engineering e.V., 2017.","bibtex":"@inproceedings{Schmitz_Fockel_2017, title={Systemmodelle als Schlüssel zu durchgängigen XIL-Testszenarien}, booktitle={ Tag des Systems Engineering 2017}, publisher={Gesellschaft f{\\\"u}r Systems Engineering e.V.}, author={Schmitz, Joachim and Fockel, Markus}, year={2017} }","short":"J. Schmitz, M. Fockel, in: Tag Des Systems Engineering 2017, Gesellschaft f{\\\"u}r Systems Engineering e.V., 2017.","ieee":"J. Schmitz and M. Fockel, “Systemmodelle als Schlüssel zu durchgängigen XIL-Testszenarien,” in Tag des Systems Engineering 2017, 2017."},"type":"conference","abstract":[{"text":"Intelligente technische Systeme, wie autonom fahrende Fahrzeuge, werden in einem hohen Maß durch Software realisiert. Der Weg zum autonomen Fahren führt unweigerlich über eine steigende Vernetzung von Steuergeräten im Fahrzeug und über Fahrzeuggrenzen hinweg. Damit einher geht eine stetig steigende Komplexität der Software. Deshalb liegt es auf der Hand, dass die systematische Qualitätssicherung für derartige technische Systeme sehr früh, also bereits entwicklungsbegleitend, erfolgen muss. Dazu lässt sich das Software-in-the-Loop-Verfahren einsetzen, das auf etablierte Techniken des Hardware-in-the-Loop-Verfahrens zurückgreift. Eine besondere Herausforderung besteht darin, Simulationsmodelle und Testbibliotheken sowie die zugehörigen Visualisierungs- und Testwerkzeuge in beiden Welten synergetisch zu nutzen. Das Ziel ist eine einheitliche X-in-the-Loop (XIL) Basis für beide Verfahren. Der Schlüssel zu einer einheitlichen Basis für durchgängige XIL-Testszenarien ist der Einsatz eines übergeordneten Systemmodells. Es definiert die Systemgrenze und umliegenden Systeme in der Umwelt. Zudem dient das Systemmodell als Ordnungsschema für die Ablage der Artefakte wie Verhaltensmodelle, Testskripte, Parametersätze oder Workflows. Ein zentrales Datenmanagementwerkzeug, welches sämtliche Strukturinformationen, Verhaltensmodelle und Variantenbezüge verknüpft, ermöglicht ein teilautomatisches Umschalten zwischen den Testszenarien. In diesem Beitrag stellen wir eine solche Lösung vor.","lang":"eng"}],"user_id":"8472","title":"Systemmodelle als Schlüssel zu durchgängigen XIL-Testszenarien","publication":" Tag des Systems Engineering 2017","department":[{"_id":"241"},{"_id":"662"}],"author":[{"last_name":"Schmitz","full_name":"Schmitz, Joachim","first_name":"Joachim"},{"first_name":"Markus","orcid":"0000-0002-1269-0702","full_name":"Fockel, Markus","last_name":"Fockel","id":"8472"}],"publisher":"Gesellschaft f{\\\"u}r Systems Engineering e.V.","date_created":"2020-12-17T13:29:01Z","status":"public"},{"status":"public","date_created":"2020-12-17T13:31:36Z","author":[{"first_name":"Markus","orcid":"0000-0002-1269-0702","full_name":"Fockel, Markus","last_name":"Fockel","id":"8472"},{"id":"3875","last_name":"Holtmann","orcid":"0000-0001-6141-4571","full_name":"Holtmann, Jörg","first_name":"Jörg"},{"full_name":"Koch, Thorsten","first_name":"Thorsten","id":"13616","last_name":"Koch"},{"first_name":"David","orcid":"0000-0001-7787-5380","full_name":"Schmelter, David","last_name":"Schmelter","id":"40982"}],"department":[{"_id":"241"},{"_id":"662"}],"title":"Model-based Requirement Pattern Catalog","user_id":"8472","place":"Paderborn, Germany","abstract":[{"lang":"eng","text":"Scenario-based requirements engineering addresses the message-based coordination of software-intensive systems and enables, if underpinned with formal languages, automatic requirements validation techniques for improving the quality of a requirements specification. One of such requirements engineering approaches bases on a recent visual Live Sequence Chart variant compliant to the Unified Modeling Language, so-called Modal Sequence Diagrams (MSDs). The usage of patterns is known to be constructive thanks to assembling solutions by means of reusable building blocks that are proven in practice, so that recurring problems do not need to be solved over and over again. Thus, patterns also gained momentum in the area of requirements documentation. In this technical report, we introduce a model- and scenario-based pattern catalog for MSD requirements. Our MSD requirement pattern catalog consolidates and unifies 86 requirement patterns from three well-known, practice-oriented requirement pattern catalogs, each covering different aspects."}],"type":"report","year":"2017","citation":{"bibtex":"@book{Fockel_Holtmann_Koch_Schmelter_2017, place={Paderborn, Germany}, title={Model-based Requirement Pattern Catalog}, author={Fockel, Markus and Holtmann, Jörg and Koch, Thorsten and Schmelter, David}, year={2017} }","mla":"Fockel, Markus, et al. Model-Based Requirement Pattern Catalog. 2017.","ama":"Fockel M, Holtmann J, Koch T, Schmelter D. Model-Based Requirement Pattern Catalog. Paderborn, Germany; 2017.","apa":"Fockel, M., Holtmann, J., Koch, T., & Schmelter, D. (2017). Model-based Requirement Pattern Catalog. Paderborn, Germany.","chicago":"Fockel, Markus, Jörg Holtmann, Thorsten Koch, and David Schmelter. Model-Based Requirement Pattern Catalog. Paderborn, Germany, 2017.","ieee":"M. Fockel, J. Holtmann, T. Koch, and D. Schmelter, Model-based Requirement Pattern Catalog. Paderborn, Germany, 2017.","short":"M. Fockel, J. Holtmann, T. Koch, D. Schmelter, Model-Based Requirement Pattern Catalog, Paderborn, Germany, 2017."},"language":[{"iso":"eng"}],"report_number":"tr-ri-17-354","date_updated":"2022-01-06T06:54:38Z","_id":"20793"},{"citation":{"ieee":"D. Schmelter, J. Greenyer, and J. Holtmann, “Toward Learning Realizable Scenario-based, Formal Requirements Specifications,” in 4th International Workshop on Artificial Intelligence for Requirements Engineering (AIRE), 2017.","short":"D. Schmelter, J. Greenyer, J. Holtmann, in: 4th International Workshop on Artificial Intelligence for Requirements Engineering (AIRE), IEEE, Lisbon, Portugal, 2017.","bibtex":"@inproceedings{Schmelter_Greenyer_Holtmann_2017, place={Lisbon, Portugal}, title={Toward Learning Realizable Scenario-based, Formal Requirements Specifications}, DOI={10.1109/REW.2017.14}, booktitle={4th International Workshop on Artificial Intelligence for Requirements Engineering (AIRE)}, publisher={IEEE}, author={Schmelter, David and Greenyer, Joel and Holtmann, Jörg}, year={2017} }","mla":"Schmelter, David, et al. “Toward Learning Realizable Scenario-Based, Formal Requirements Specifications.” 4th International Workshop on Artificial Intelligence for Requirements Engineering (AIRE), IEEE, 2017, doi:10.1109/REW.2017.14.","apa":"Schmelter, D., Greenyer, J., & Holtmann, J. (2017). Toward Learning Realizable Scenario-based, Formal Requirements Specifications. In 4th International Workshop on Artificial Intelligence for Requirements Engineering (AIRE). Lisbon, Portugal: IEEE. https://doi.org/10.1109/REW.2017.14","ama":"Schmelter D, Greenyer J, Holtmann J. Toward Learning Realizable Scenario-based, Formal Requirements Specifications. In: 4th International Workshop on Artificial Intelligence for Requirements Engineering (AIRE). Lisbon, Portugal: IEEE; 2017. doi:10.1109/REW.2017.14","chicago":"Schmelter, David, Joel Greenyer, and Jörg Holtmann. “Toward Learning Realizable Scenario-Based, Formal Requirements Specifications.” In 4th International Workshop on Artificial Intelligence for Requirements Engineering (AIRE). Lisbon, Portugal: IEEE, 2017. https://doi.org/10.1109/REW.2017.14."},"type":"conference","year":"2017","language":[{"iso":"eng"}],"doi":"10.1109/REW.2017.14","date_updated":"2022-01-06T06:54:38Z","_id":"20795","date_created":"2020-12-17T13:34:07Z","status":"public","department":[{"_id":"241"},{"_id":"662"}],"publication":"4th International Workshop on Artificial Intelligence for Requirements Engineering (AIRE)","author":[{"first_name":"David","orcid":"0000-0001-7787-5380","full_name":"Schmelter, David","last_name":"Schmelter","id":"40982"},{"full_name":"Greenyer, Joel","first_name":"Joel","last_name":"Greenyer"},{"last_name":"Holtmann","id":"3875","first_name":"Jörg","full_name":"Holtmann, Jörg","orcid":"0000-0001-6141-4571"}],"publisher":"IEEE","title":"Toward Learning Realizable Scenario-based, Formal Requirements Specifications","user_id":"40982","abstract":[{"text":"Distributed, software-intensive systems such as fully automated cars have to handle various situations employing message-based coordination. The growing complexity of such systems results in an increasing difficulty to achieve a high quality of the systems’ requirements specifications, particularly w.r.t. the realizability of the specifications. Scenario-based requirements engineering addresses the message-based coordination of such systems and enables, if underpinned with formal languages, automatic requirements validation techniques for proving the realizability of a requirements specification. However, formal requirements modeling languages require a deep knowledge of requirements engineers and typically require many manual iterations until they find a realizable specification. In order to support requirements engineers in the stepwise development of scenario-based requirements specifications, we propose to evolve a high-quality specification from a (presumably unrealizable) manually created specification employing an evolutionary algorithm. In this paper, we show our results on automatically evolving new assumptions on the systems’ environment behavior that guarantee a realizable requirements specification. Based on this contribution, we outline our research roadmap toward our long-term goal of automatically supporting requirements engineers in finding high-quality requirements specifications.","lang":"eng"}],"place":"Lisbon, Portugal"},{"user_id":"40982","title":"Improving the Product Control of Mechatronic Systems Using Key Performance Indicators","publisher":"DEStech Publications, Inc.","author":[{"full_name":"Wohlers, Benedict","first_name":"Benedict","id":"53786","last_name":"Wohlers"},{"last_name":"Dziwok","id":"3901","first_name":"Stefan","orcid":"http://orcid.org/0000-0002-8679-6673","full_name":"Dziwok, Stefan"},{"first_name":"Christian","full_name":"Bremer, Christian","last_name":"Bremer"},{"first_name":"David","orcid":"0000-0001-7787-5380","full_name":"Schmelter, David","last_name":"Schmelter","id":"40982"},{"last_name":"Lorenz","full_name":"Lorenz, Wadim","first_name":"Wadim"}],"publication":"Proceedings of the 24th International Conference on Production Research (ICPR)","department":[{"_id":"241"},{"_id":"662"}],"status":"public","date_created":"2020-12-17T13:35:17Z","_id":"20796","date_updated":"2022-01-06T06:54:38Z","language":[{"iso":"eng"}],"type":"conference","citation":{"short":"B. Wohlers, S. Dziwok, C. Bremer, D. Schmelter, W. Lorenz, in: Proceedings of the 24th International Conference on Production Research (ICPR), DEStech Publications, Inc., 2017.","ieee":"B. Wohlers, S. Dziwok, C. Bremer, D. Schmelter, and W. Lorenz, “Improving the Product Control of Mechatronic Systems Using Key Performance Indicators,” in Proceedings of the 24th International Conference on Production Research (ICPR), 2017.","ama":"Wohlers B, Dziwok S, Bremer C, Schmelter D, Lorenz W. Improving the Product Control of Mechatronic Systems Using Key Performance Indicators. In: Proceedings of the 24th International Conference on Production Research (ICPR). DEStech Publications, Inc.; 2017.","apa":"Wohlers, B., Dziwok, S., Bremer, C., Schmelter, D., & Lorenz, W. (2017). Improving the Product Control of Mechatronic Systems Using Key Performance Indicators. In Proceedings of the 24th International Conference on Production Research (ICPR). DEStech Publications, Inc.","chicago":"Wohlers, Benedict, Stefan Dziwok, Christian Bremer, David Schmelter, and Wadim Lorenz. “Improving the Product Control of Mechatronic Systems Using Key Performance Indicators.” In Proceedings of the 24th International Conference on Production Research (ICPR). DEStech Publications, Inc., 2017.","mla":"Wohlers, Benedict, et al. “Improving the Product Control of Mechatronic Systems Using Key Performance Indicators.” Proceedings of the 24th International Conference on Production Research (ICPR), DEStech Publications, Inc., 2017.","bibtex":"@inproceedings{Wohlers_Dziwok_Bremer_Schmelter_Lorenz_2017, title={Improving the Product Control of Mechatronic Systems Using Key Performance Indicators}, booktitle={Proceedings of the 24th International Conference on Production Research (ICPR)}, publisher={DEStech Publications, Inc.}, author={Wohlers, Benedict and Dziwok, Stefan and Bremer, Christian and Schmelter, David and Lorenz, Wadim}, year={2017} }"},"year":"2017"},{"publication":"Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development","department":[{"_id":"241"},{"_id":"662"}],"author":[{"first_name":"Thorsten","full_name":"Koch, Thorsten","last_name":"Koch","id":"13616"},{"last_name":"Holtmann","id":"3875","first_name":"Jörg","orcid":"0000-0001-6141-4571","full_name":"Holtmann, Jörg"},{"last_name":"Lindemann","full_name":"Lindemann, Timo","first_name":"Timo"}],"date_created":"2020-12-17T13:51:04Z","status":"public","abstract":[{"lang":"eng","text":"Original equipment manufacturers (OEMs) build mechatronic systems using components from several suppliers in industry sectors like automation. The suppliers provide geometrical information via the standardized exchange format STEP, such that the OEM is able to virtually layout the overall system. Beyond the geometrical information, the OEM needs additional technical information for his development tasks. For that reason, STEP provides an extension mechanism for extending and tailoring STEP to project-specific needs. However, extending STEP moreover requires extending several capabilities of all involved tools, causing high development effort. This effort prevents the project-specific utilization of the STEP extension mechanism and forces the organizations to use awkward workarounds. In order to cope with this problem, we present a model-driven approach enabling the flexible specification of STEP extensions and particularly the automatic derivation of the required further capabilities for two involved tools. We illustrate and evaluate the approach with an automation production system example."}],"title":"Flexible Specification of STEP Application Protocol Extensions and Automatic Derivation of Tool Capabilities","user_id":"13616","year":"2017","type":"conference","citation":{"short":"T. Koch, J. Holtmann, T. Lindemann, in: Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017.","ieee":"T. Koch, J. Holtmann, and T. Lindemann, “Flexible Specification of STEP Application Protocol Extensions and Automatic Derivation of Tool Capabilities,” in Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017.","apa":"Koch, T., Holtmann, J., & Lindemann, T. (2017). Flexible Specification of STEP Application Protocol Extensions and Automatic Derivation of Tool Capabilities. In Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development. https://doi.org/10.5220/0006137400530064","ama":"Koch T, Holtmann J, Lindemann T. Flexible Specification of STEP Application Protocol Extensions and Automatic Derivation of Tool Capabilities. In: Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development. ; 2017. doi:10.5220/0006137400530064","chicago":"Koch, Thorsten, Jörg Holtmann, and Timo Lindemann. “Flexible Specification of STEP Application Protocol Extensions and Automatic Derivation of Tool Capabilities.” In Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017. https://doi.org/10.5220/0006137400530064.","mla":"Koch, Thorsten, et al. “Flexible Specification of STEP Application Protocol Extensions and Automatic Derivation of Tool Capabilities.” Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017, doi:10.5220/0006137400530064.","bibtex":"@inproceedings{Koch_Holtmann_Lindemann_2017, title={Flexible Specification of STEP Application Protocol Extensions and Automatic Derivation of Tool Capabilities}, DOI={10.5220/0006137400530064}, booktitle={Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development}, author={Koch, Thorsten and Holtmann, Jörg and Lindemann, Timo}, year={2017} }"},"language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:54:39Z","_id":"20801","doi":"10.5220/0006137400530064"},{"date_updated":"2022-01-06T06:54:39Z","_id":"20802","citation":{"short":"J. Holtmann, R. Bernijazov, M. Meyer, D. Schmelter, C. Tschirner, in: J. Jürjens, K. Schneider (Eds.), Proceedings of the Software Engineering 2017, Gesellschaft fuer Informatik, 2017, pp. 109–110.","ieee":"J. Holtmann, R. Bernijazov, M. Meyer, D. Schmelter, and C. Tschirner, “Integrated and Iterative Systems Engineering and Software Requirements Engineering for Technical Systems (Précis),” in Proceedings of the Software Engineering 2017, 2017, vol. P-267, pp. 109–110.","ama":"Holtmann J, Bernijazov R, Meyer M, Schmelter D, Tschirner C. Integrated and Iterative Systems Engineering and Software Requirements Engineering for Technical Systems (Précis). In: Jürjens J, Schneider K, eds. Proceedings of the Software Engineering 2017. Vol P-267. Lecture Notes in Informatics (LNI). Gesellschaft fuer Informatik; 2017:109-110.","apa":"Holtmann, J., Bernijazov, R., Meyer, M., Schmelter, D., & Tschirner, C. (2017). Integrated and Iterative Systems Engineering and Software Requirements Engineering for Technical Systems (Précis). In J. Jürjens & K. Schneider (Eds.), Proceedings of the Software Engineering 2017 (Vol. P-267, pp. 109–110). Gesellschaft fuer Informatik.","chicago":"Holtmann, Jörg, Ruslan Bernijazov, Matthias Meyer, David Schmelter, and Christian Tschirner. “Integrated and Iterative Systems Engineering and Software Requirements Engineering for Technical Systems (Précis).” In Proceedings of the Software Engineering 2017, edited by Jan Jürjens and Kurt Schneider, P-267:109–10. Lecture Notes in Informatics (LNI). Gesellschaft fuer Informatik, 2017.","bibtex":"@inproceedings{Holtmann_Bernijazov_Meyer_Schmelter_Tschirner_2017, series={Lecture Notes in Informatics (LNI)}, title={Integrated and Iterative Systems Engineering and Software Requirements Engineering for Technical Systems (Précis)}, volume={P-267}, booktitle={Proceedings of the Software Engineering 2017}, publisher={Gesellschaft fuer Informatik}, author={Holtmann, Jörg and Bernijazov, Ruslan and Meyer, Matthias and Schmelter, David and Tschirner, Christian}, editor={Jürjens, Jan and Schneider, KurtEditors}, year={2017}, pages={109–110}, collection={Lecture Notes in Informatics (LNI)} }","mla":"Holtmann, Jörg, et al. “Integrated and Iterative Systems Engineering and Software Requirements Engineering for Technical Systems (Précis).” Proceedings of the Software Engineering 2017, edited by Jan Jürjens and Kurt Schneider, vol. P-267, Gesellschaft fuer Informatik, 2017, pp. 109–10."},"type":"conference","year":"2017","page":"109-110","language":[{"iso":"eng"}],"series_title":"Lecture Notes in Informatics (LNI)","title":"Integrated and Iterative Systems Engineering and Software Requirements Engineering for Technical Systems (Précis)","user_id":"40982","abstract":[{"text":"The development of software-intensive technical systems (e.g., within the automotive industry) involves several engineering disciplines like mechanical, electrical, control, and particularly software engineering. Model-based Systems Engineering (MBSE) coordinates these disciplines throughout the development by means of a discipline-spanning system model. An integral part of MBSE is the requirements engineering on the system level. However, these requirements need to be refined for the discipline-specific development to start, for example, into specific requirements for the embedded software. Since existing MBSE approaches lack support for this refinement step, we conceived a systematic and iterative transition from MBSE to model-based software requirements engineering, which we present in this talk. We automated the steps of the transition where possible, in order to avoid error-prone and time-consuming manual tasks. We illustrate the approach and perform a case study with an example of an automotive embedded system.","lang":"eng"}],"editor":[{"first_name":"Jan","full_name":"Jürjens, Jan","last_name":"Jürjens"},{"first_name":"Kurt","full_name":"Schneider, Kurt","last_name":"Schneider"}],"volume":"P-267","status":"public","date_created":"2020-12-17T13:53:41Z","publisher":"Gesellschaft fuer Informatik","author":[{"orcid":"0000-0001-6141-4571","full_name":"Holtmann, Jörg","first_name":"Jörg","id":"3875","last_name":"Holtmann"},{"full_name":"Bernijazov, Ruslan","first_name":"Ruslan","last_name":"Bernijazov"},{"full_name":"Meyer, Matthias","first_name":"Matthias","id":"683","last_name":"Meyer"},{"full_name":"Schmelter, David","orcid":"0000-0001-7787-5380","first_name":"David","id":"40982","last_name":"Schmelter"},{"last_name":"Tschirner","first_name":"Christian","full_name":"Tschirner, Christian"}],"department":[{"_id":"241"},{"_id":"662"}],"publication":"Proceedings of the Software Engineering 2017"},{"date_updated":"2022-01-06T06:54:39Z","_id":"20804","type":"conference","citation":{"short":"J. Geismann, U. Pohlmann, D. Schmelter, in: Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017.","ieee":"J. Geismann, U. Pohlmann, and D. Schmelter, “Towards an Automated Synthesis of a Real-time Scheduling for Cyber-physical Multi-core Systems,” 2017.","chicago":"Geismann, Johannes, Uwe Pohlmann, and David Schmelter. “Towards an Automated Synthesis of a Real-Time Scheduling for Cyber-Physical Multi-Core Systems.” In Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017.","ama":"Geismann J, Pohlmann U, Schmelter D. Towards an Automated Synthesis of a Real-time Scheduling for Cyber-physical Multi-core Systems. In: Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development. ; 2017.","apa":"Geismann, J., Pohlmann, U., & Schmelter, D. (2017). Towards an Automated Synthesis of a Real-time Scheduling for Cyber-physical Multi-core Systems. Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development.","mla":"Geismann, Johannes, et al. “Towards an Automated Synthesis of a Real-Time Scheduling for Cyber-Physical Multi-Core Systems.” Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017.","bibtex":"@inproceedings{Geismann_Pohlmann_Schmelter_2017, title={Towards an Automated Synthesis of a Real-time Scheduling for Cyber-physical Multi-core Systems}, booktitle={Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development}, author={Geismann, Johannes and Pohlmann, Uwe and Schmelter, David}, year={2017} }"},"year":"2017","language":[{"iso":"eng"}],"abstract":[{"lang":"eng","text":"Modern Cyber-physical Systems are executed in physical environments and distributed over several Electronic Control Units using multiple cores for execution. These systems perform safety-critical tasks and, therefore, have to fulfill hard real-time requirements. To face these requirements systematically, system engineers de- velop these systems model-driven and prove the fulfillment of these requirements via model checking. It is important to ensure that the runtime scheduling does not violate the verified requirements by neglecting the model checking assumptions. Currently, there is a gap in the process for model-driven approaches to derive a feasible runtime scheduling that respects these assumptions. In this paper, we present an approach for a semi- automatic synthesis of behavioral models into a deterministic scheduling that respects real-time requirements at runtime. We evaluate our approach using an example of a distributed automotive system with hard real-time requirements specified with the MechatronicUML method."}],"title":"Towards an Automated Synthesis of a Real-time Scheduling for Cyber-physical Multi-core Systems","user_id":"5786","publication":"Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development","department":[{"_id":"76"},{"_id":"241"},{"_id":"662"}],"author":[{"last_name":"Geismann","id":"20063","first_name":"Johannes","full_name":"Geismann, Johannes","orcid":"https://orcid.org/0000-0003-2015-2047"},{"last_name":"Pohlmann","first_name":"Uwe","full_name":"Pohlmann, Uwe"},{"full_name":"Schmelter, David","orcid":"0000-0001-7787-5380","first_name":"David","id":"40982","last_name":"Schmelter"}],"date_created":"2020-12-17T13:59:04Z","status":"public"},{"doi":"10.13140/RG.2.2.33223.29606","_id":"20823","date_updated":"2022-01-06T06:54:40Z","language":[{"iso":"eng"}],"type":"report","citation":{"ieee":"J. Holtmann et al., The MechatronicUML Requirements Engineering Method: Process and Language. 2016.","short":"J. Holtmann, M. Fockel, T. Koch, D. Schmelter, C. Brenner, R. Bernijazov, M. Sander, The MechatronicUML Requirements Engineering Method: Process and Language, 2016.","mla":"Holtmann, Jörg, et al. The MechatronicUML Requirements Engineering Method: Process and Language. 2016, doi:10.13140/RG.2.2.33223.29606.","bibtex":"@book{Holtmann_Fockel_Koch_Schmelter_Brenner_Bernijazov_Sander_2016, title={The MechatronicUML Requirements Engineering Method: Process and Language}, DOI={10.13140/RG.2.2.33223.29606}, author={Holtmann, Jörg and Fockel, Markus and Koch, Thorsten and Schmelter, David and Brenner, Christian and Bernijazov, Ruslan and Sander, Marcel}, year={2016} }","apa":"Holtmann, J., Fockel, M., Koch, T., Schmelter, D., Brenner, C., Bernijazov, R., & Sander, M. (2016). The MechatronicUML Requirements Engineering Method: Process and Language. https://doi.org/10.13140/RG.2.2.33223.29606","ama":"Holtmann J, Fockel M, Koch T, et al. The MechatronicUML Requirements Engineering Method: Process and Language.; 2016. doi:10.13140/RG.2.2.33223.29606","chicago":"Holtmann, Jörg, Markus Fockel, Thorsten Koch, David Schmelter, Christian Brenner, Ruslan Bernijazov, and Marcel Sander. The MechatronicUML Requirements Engineering Method: Process and Language, 2016. https://doi.org/10.13140/RG.2.2.33223.29606."},"year":"2016","user_id":"5786","title":"The MechatronicUML Requirements Engineering Method: Process and Language","abstract":[{"text":"In this technical report, we present the MechatronicUML requirements engineering method. The method encompasses a process and a scenario-based modeling language for the documentation and analysis of requirements on the message-based interaction behavior of software-intensive systems. The modeling language uses a scenario notation based on Modal Sequence Diagrams (MSDs), which borrows concepts of UML Interactions as well as of Live Sequence Charts. Furthermore, we introduce the so-called Emergency Braking & Evasion System (EBEAS) as a running example, which is based on current and upcoming real-world driver assistance systems. ","lang":"eng"}],"date_created":"2020-12-22T09:28:23Z","status":"public","department":[{"_id":"76"},{"_id":"241"},{"_id":"662"}],"author":[{"orcid":"0000-0001-6141-4571","full_name":"Holtmann, Jörg","first_name":"Jörg","id":"3875","last_name":"Holtmann"},{"full_name":"Fockel, Markus","orcid":"0000-0002-1269-0702","first_name":"Markus","id":"8472","last_name":"Fockel"},{"first_name":"Thorsten","full_name":"Koch, Thorsten","last_name":"Koch","id":"13616"},{"id":"40982","last_name":"Schmelter","full_name":"Schmelter, David","orcid":"0000-0001-7787-5380","first_name":"David"},{"first_name":"Christian","full_name":"Brenner, Christian","last_name":"Brenner"},{"full_name":"Bernijazov, Ruslan","first_name":"Ruslan","last_name":"Bernijazov"},{"full_name":"Sander, Marcel","first_name":"Marcel","last_name":"Sander"}]},{"abstract":[{"text":"The development of today’s technical products (e.g., in automation) is characterized by high customer expectations regarding the product individualization, which causes a wide range of product variants. Original equipment manufacturers (OEMs) can apply classical approaches from product line engineering, like feature modeling, to cope with the variability and the induced development complexity. Our tool support for feature models integrates a variety of feature model extensions like feature attributes and properties, logical constraints between features and feature properties, and the distinction between features and feature realizations. Furthermore, technical products have geometrical dimensions. The OEM specifies Computer Aided Design (CAD) models to consider these geometric dimensions and to virtually layout particular product variants. Geometric assembly constraints specify how parts of the product can be arranged in a CAD model. However, a potential product customer cannot configure an individual product variant and virtually layout this variant in the same software tool since the respective information stems from different sources. In order to cope with this problem, we present in this paper an extension of our tool support for feature models to specify geometric assembly constraints. Based on the proposed extension, we outline our research roadmap to consider these constraints in an online shop of an e-commerce system, in which a potential customer shall be able to configure a product variant and to virtually layout it according to the assembly constraints.\r\n","lang":"eng"}],"user_id":"13616","title":"Towards Feature-based Product Line Engineering of Technical Systems","publication":"3rd International Conference on System-integrated Intelligence: New Challenges for Product and Production Engineering (SysInt 2016)","department":[{"_id":"241"},{"_id":"662"}],"publisher":"Elsevier","author":[{"last_name":"Koch","id":"13616","first_name":"Thorsten","full_name":"Koch, Thorsten"},{"first_name":"Jörg","full_name":"Holtmann, Jörg","orcid":"0000-0001-6141-4571","last_name":"Holtmann","id":"3875"},{"full_name":"Schubert, David","first_name":"David","id":"9106","last_name":"Schubert"},{"full_name":"Lindemann, Timo","first_name":"Timo","last_name":"Lindemann"}],"date_created":"2020-12-22T09:33:36Z","status":"public","editor":[{"full_name":"Trächtler, Ansgar","first_name":"Ansgar","last_name":"Trächtler"},{"full_name":"Denkena, Berend","first_name":"Berend","last_name":"Denkena"},{"last_name":"Thoben","full_name":"Thoben, Klaus-Dieter","first_name":"Klaus-Dieter"}],"_id":"20826","date_updated":"2022-01-06T06:54:40Z","doi":"10.1016/j.protcy.2016.08.057","language":[{"iso":"eng"}],"page":"447-454","citation":{"bibtex":"@inproceedings{Koch_Holtmann_Schubert_Lindemann_2016, title={Towards Feature-based Product Line Engineering of Technical Systems}, DOI={10.1016/j.protcy.2016.08.057}, booktitle={3rd International Conference on System-integrated Intelligence: New Challenges for Product and Production Engineering (SysInt 2016)}, publisher={Elsevier}, author={Koch, Thorsten and Holtmann, Jörg and Schubert, David and Lindemann, Timo}, editor={Trächtler, Ansgar and Denkena, Berend and Thoben, Klaus-DieterEditors}, year={2016}, pages={447–454} }","mla":"Koch, Thorsten, et al. “Towards Feature-Based Product Line Engineering of Technical Systems.” 3rd International Conference on System-Integrated Intelligence: New Challenges for Product and Production Engineering (SysInt 2016), edited by Ansgar Trächtler et al., Elsevier, 2016, pp. 447–54, doi:10.1016/j.protcy.2016.08.057.","chicago":"Koch, Thorsten, Jörg Holtmann, David Schubert, and Timo Lindemann. “Towards Feature-Based Product Line Engineering of Technical Systems.” In 3rd International Conference on System-Integrated Intelligence: New Challenges for Product and Production Engineering (SysInt 2016), edited by Ansgar Trächtler, Berend Denkena, and Klaus-Dieter Thoben, 447–54. Elsevier, 2016. https://doi.org/10.1016/j.protcy.2016.08.057.","apa":"Koch, T., Holtmann, J., Schubert, D., & Lindemann, T. (2016). Towards Feature-based Product Line Engineering of Technical Systems. In A. Trächtler, B. Denkena, & K.-D. Thoben (Eds.), 3rd International Conference on System-integrated Intelligence: New Challenges for Product and Production Engineering (SysInt 2016) (pp. 447–454). Elsevier. https://doi.org/10.1016/j.protcy.2016.08.057","ama":"Koch T, Holtmann J, Schubert D, Lindemann T. Towards Feature-based Product Line Engineering of Technical Systems. In: Trächtler A, Denkena B, Thoben K-D, eds. 3rd International Conference on System-Integrated Intelligence: New Challenges for Product and Production Engineering (SysInt 2016). Elsevier; 2016:447-454. doi:10.1016/j.protcy.2016.08.057","ieee":"T. Koch, J. Holtmann, D. Schubert, and T. Lindemann, “Towards Feature-based Product Line Engineering of Technical Systems,” in 3rd International Conference on System-integrated Intelligence: New Challenges for Product and Production Engineering (SysInt 2016), 2016, pp. 447–454.","short":"T. Koch, J. Holtmann, D. Schubert, T. Lindemann, in: A. Trächtler, B. Denkena, K.-D. Thoben (Eds.), 3rd International Conference on System-Integrated Intelligence: New Challenges for Product and Production Engineering (SysInt 2016), Elsevier, 2016, pp. 447–454."},"type":"conference","year":"2016"},{"abstract":[{"lang":"eng","text":"Cyber-physical systems like self-driving cars are highly complex and safety-critical. This results in a great number of safety requirements that have different levels of criticality. In automotive, the criticality is categorized in Automotive Safety Integrity Levels (ASIL). As a high ASIL causes high development effort, the goal is to develop most subsystems with lower ASIL requirements. To achieve this ASIL tailoring, subsystems need to be separated or redundantly implemented. These safety measures are usually integrated late in the development process and thus cause costly development iterations. In this paper, we present a systematic, tool-supported ASIL tailoring process for the requirements analysis phase. It is applied on formal safety requirements and automatically generated fault trees for a functional view of the system. The process supports early planning of safety efforts for mixed-criticality systems and avoids costly late development iterations."}],"place":"Trondheim, Norway","title":"ASIL Tailoring on Functional Safety Requirements","user_id":"8472","publication":"5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR)","department":[{"_id":"241"},{"_id":"662"}],"publisher":"Springer International Publishing Switzerland","author":[{"full_name":"Fockel, Markus","orcid":"0000-0002-1269-0702","first_name":"Markus","id":"8472","last_name":"Fockel"}],"volume":9923,"date_created":"2020-12-22T09:35:16Z","status":"public","date_updated":"2022-01-06T06:54:40Z","_id":"20827","intvolume":" 9923","series_title":"Lecture Notes in Computer Science (LNCS)","page":"298–310","type":"conference","year":"2016","citation":{"ama":"Fockel M. ASIL Tailoring on Functional Safety Requirements. In: 5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR). Vol 9923. Lecture Notes in Computer Science (LNCS). Trondheim, Norway: Springer International Publishing Switzerland; 2016:298–310.","apa":"Fockel, M. (2016). ASIL Tailoring on Functional Safety Requirements. In 5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR) (Vol. 9923, pp. 298–310). Trondheim, Norway: Springer International Publishing Switzerland.","chicago":"Fockel, Markus. “ASIL Tailoring on Functional Safety Requirements.” In 5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR), 9923:298–310. Lecture Notes in Computer Science (LNCS). Trondheim, Norway: Springer International Publishing Switzerland, 2016.","bibtex":"@inproceedings{Fockel_2016, place={Trondheim, Norway}, series={Lecture Notes in Computer Science (LNCS)}, title={ASIL Tailoring on Functional Safety Requirements}, volume={9923}, booktitle={5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR)}, publisher={Springer International Publishing Switzerland}, author={Fockel, Markus}, year={2016}, pages={298–310}, collection={Lecture Notes in Computer Science (LNCS)} }","mla":"Fockel, Markus. “ASIL Tailoring on Functional Safety Requirements.” 5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR), vol. 9923, Springer International Publishing Switzerland, 2016, pp. 298–310.","short":"M. Fockel, in: 5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR), Springer International Publishing Switzerland, Trondheim, Norway, 2016, pp. 298–310.","ieee":"M. Fockel, “ASIL Tailoring on Functional Safety Requirements,” in 5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR), 2016, vol. 9923, pp. 298–310."},"language":[{"iso":"eng"}]},{"abstract":[{"lang":"ger","text":"In verschiedenen Unternehmen wird mit Anforderungen unterschiedlich umgegangen. Je nach Größe, Branche und Unternehmenskultur ist das Thema Requirements Engineering (RE) mal weniger, mal mehr etabliert. In einigen Unternehmen wird es als lästige Zusatzaufgabe betrachtet, während andere Unternehmen ganze Abteilungen mit RE als Kernkompetenz betreiben. RE wird allerdings in jedem Projekt - bewusst oder unbewusst - durchgeführt! RE ist die Basis für den weiteren Entwicklungsprozess, die Validierung/Verifikation und die Plan- und Messbarkeit des Projekts. Darüber hinaus können Fehler, die auf Anforderungsebene gefunden werden, weniger aufwendig und somit günstiger behoben werden als in späteren Entwicklungsphasen. Am Fraunhofer IEM beraten wir Unternehmen und erforschen neue Methoden bezüglich der Entwicklung von intelligenten technischen Systemen. In diesem Artikel berichten wir über unsere Erfahrungen aus Projekten, in denen wir Unternehmen aus verschiedenen Branchen und mit unterschiedlichem RE-Reifegrad zwecks Leistungssteigerung des RE begleitet haben. Auf Basis dieser Projekterfahrungen zeigen wir Wege auf, wie der Stand des RE mittels eines Reifegradmodells im eigenen Unternehmen verbessert werden kann."}],"user_id":"8472","title":"Requirements Engineering - Zusatzaufgabe oder Kernkompetenz?","publication":"OBJEKTspektrum","department":[{"_id":"241"},{"_id":"662"}],"author":[{"last_name":"Holtmann","id":"3875","first_name":"Jörg","full_name":"Holtmann, Jörg","orcid":"0000-0001-6141-4571"},{"first_name":"Markus","orcid":"0000-0002-1269-0702","full_name":"Fockel, Markus","last_name":"Fockel","id":"8472"},{"last_name":"Koch","id":"13616","first_name":"Thorsten","full_name":"Koch, Thorsten"},{"full_name":"Schmelter, David","orcid":"0000-0001-7787-5380","first_name":"David","id":"40982","last_name":"Schmelter"}],"date_created":"2020-12-22T09:36:49Z","status":"public","_id":"20828","date_updated":"2022-01-06T06:54:40Z","issue":"RE/2016","main_file_link":[{"url":"http://www.sigs-datacom.de/uploads/tx_dmjournals/fockel_holtmann_koch_schmelter_OTS_RE_16.pdf"}],"language":[{"iso":"eng"}],"type":"journal_article","year":"2016","citation":{"short":"J. Holtmann, M. Fockel, T. Koch, D. Schmelter, OBJEKTspektrum (2016).","ieee":"J. Holtmann, M. Fockel, T. Koch, and D. Schmelter, “Requirements Engineering - Zusatzaufgabe oder Kernkompetenz?,” OBJEKTspektrum, no. RE/2016, 2016.","ama":"Holtmann J, Fockel M, Koch T, Schmelter D. Requirements Engineering - Zusatzaufgabe oder Kernkompetenz? OBJEKTspektrum. 2016;(RE/2016).","apa":"Holtmann, J., Fockel, M., Koch, T., & Schmelter, D. (2016). Requirements Engineering - Zusatzaufgabe oder Kernkompetenz? OBJEKTspektrum, (RE/2016).","chicago":"Holtmann, Jörg, Markus Fockel, Thorsten Koch, and David Schmelter. “Requirements Engineering - Zusatzaufgabe Oder Kernkompetenz?” OBJEKTspektrum, no. RE/2016 (2016).","mla":"Holtmann, Jörg, et al. “Requirements Engineering - Zusatzaufgabe Oder Kernkompetenz?” OBJEKTspektrum, no. RE/2016, 2016.","bibtex":"@article{Holtmann_Fockel_Koch_Schmelter_2016, title={Requirements Engineering - Zusatzaufgabe oder Kernkompetenz?}, number={RE/2016}, journal={OBJEKTspektrum}, author={Holtmann, Jörg and Fockel, Markus and Koch, Thorsten and Schmelter, David}, year={2016} }"}},{"language":[{"iso":"eng"}],"citation":{"mla":"Holtmann, Jörg, et al. “Integrated and Iterative Systems Engineering and Software Requirements Engineering for Technical Systems.” Journal of Software Evolution and Process, 2016, doi:10.1002/smr.1780.","bibtex":"@article{Holtmann_Bernijazov_Meyer_Schmelter_Tschirner_2016, title={Integrated and iterative systems engineering and software requirements engineering for technical systems}, DOI={10.1002/smr.1780}, journal={Journal of Software Evolution and Process}, author={Holtmann, Jörg and Bernijazov, Ruslan and Meyer, Matthias and Schmelter, David and Tschirner, Christian}, year={2016} }","ama":"Holtmann J, Bernijazov R, Meyer M, Schmelter D, Tschirner C. Integrated and iterative systems engineering and software requirements engineering for technical systems. Journal of Software Evolution and Process. 2016. doi:10.1002/smr.1780","apa":"Holtmann, J., Bernijazov, R., Meyer, M., Schmelter, D., & Tschirner, C. (2016). Integrated and iterative systems engineering and software requirements engineering for technical systems. Journal of Software Evolution and Process. https://doi.org/10.1002/smr.1780","chicago":"Holtmann, Jörg, Ruslan Bernijazov, Matthias Meyer, David Schmelter, and Christian Tschirner. “Integrated and Iterative Systems Engineering and Software Requirements Engineering for Technical Systems.” Journal of Software Evolution and Process, 2016. https://doi.org/10.1002/smr.1780.","ieee":"J. Holtmann, R. Bernijazov, M. Meyer, D. Schmelter, and C. Tschirner, “Integrated and iterative systems engineering and software requirements engineering for technical systems,” Journal of Software Evolution and Process, 2016.","short":"J. Holtmann, R. Bernijazov, M. Meyer, D. Schmelter, C. Tschirner, Journal of Software Evolution and Process (2016)."},"type":"journal_article","year":"2016","doi":"10.1002/smr.1780","date_updated":"2022-01-06T06:54:40Z","_id":"20829","status":"public","date_created":"2020-12-22T09:39:46Z","author":[{"last_name":"Holtmann","id":"3875","first_name":"Jörg","orcid":"0000-0001-6141-4571","full_name":"Holtmann, Jörg"},{"full_name":"Bernijazov, Ruslan","first_name":"Ruslan","last_name":"Bernijazov"},{"last_name":"Meyer","id":"683","first_name":"Matthias","full_name":"Meyer, Matthias"},{"last_name":"Schmelter","id":"40982","first_name":"David","orcid":"0000-0001-7787-5380","full_name":"Schmelter, David"},{"last_name":"Tschirner","first_name":"Christian","full_name":"Tschirner, Christian"}],"publication":"Journal of Software Evolution and Process","department":[{"_id":"241"},{"_id":"662"}],"user_id":"40982","title":"Integrated and iterative systems engineering and software requirements engineering for technical systems","abstract":[{"lang":"eng","text":"The development of software-intensive technical systems involves several engineering disciplines like mechanical, electrical, control, and particularly software engineering. Model-based Systems Engineering (MBSE) coordinates these disciplines throughout the development by means of discipline-spanning processes and a system model. Such a system model provides a common understanding of the system under development and serves as a starting point for the discipline-specific development. An integral part of MBSE is the requirements engineering on the system level. However, these requirements need to be refined for the discipline-specific development to start, e.g., into specific requirements for the embedded software. Since existing MBSE approaches lack support for this refinement step, we conceived in previous work a systematic transition from MBSE to model-based software requirements engineering. We automated the steps of the transition where possible, in order to avoid error-prone and time-consuming manual tasks. In this paper, we extend this approach with support for subsequent process iterations and provide an algorithm for the automated steps. We illustrate the approach and perform a case study with an example of an automotive embedded system."}]},{"type":"conference","citation":{"ieee":"J. Schmitz and M. Fockel, “Vom Systemmodell zu disziplinspezifischen Modellen und zurück,” in Tag des Systems Engineering 2015, 2015.","short":"J. Schmitz, M. Fockel, in: Tag Des Systems Engineering 2015, Gesellschaft für Systems Engineering e.V., 2015.","mla":"Schmitz, Joachim, and Markus Fockel. “Vom Systemmodell Zu Disziplinspezifischen Modellen Und Zurück.” Tag Des Systems Engineering 2015, Gesellschaft für Systems Engineering e.V., 2015.","bibtex":"@inproceedings{Schmitz_Fockel_2015, title={Vom Systemmodell zu disziplinspezifischen Modellen und zurück}, booktitle={Tag des Systems Engineering 2015}, publisher={Gesellschaft für Systems Engineering e.V.}, author={Schmitz, Joachim and Fockel, Markus}, year={2015} }","chicago":"Schmitz, Joachim, and Markus Fockel. “Vom Systemmodell Zu Disziplinspezifischen Modellen Und Zurück.” In Tag Des Systems Engineering 2015. Gesellschaft für Systems Engineering e.V., 2015.","ama":"Schmitz J, Fockel M. Vom Systemmodell zu disziplinspezifischen Modellen und zurück. In: Tag Des Systems Engineering 2015. Gesellschaft für Systems Engineering e.V.; 2015.","apa":"Schmitz, J., & Fockel, M. (2015). Vom Systemmodell zu disziplinspezifischen Modellen und zurück. In Tag des Systems Engineering 2015. Gesellschaft für Systems Engineering e.V."},"year":"2015","language":[{"iso":"eng"}],"_id":"20969","date_updated":"2022-01-06T06:54:42Z","date_created":"2021-01-13T13:02:44Z","status":"public","publication":"Tag des Systems Engineering 2015","department":[{"_id":"241"},{"_id":"662"}],"author":[{"last_name":"Schmitz","full_name":"Schmitz, Joachim","first_name":"Joachim"},{"first_name":"Markus","full_name":"Fockel, Markus","orcid":"0000-0002-1269-0702","last_name":"Fockel","id":"8472"}],"publisher":"Gesellschaft für Systems Engineering e.V.","title":"Vom Systemmodell zu disziplinspezifischen Modellen und zurück","user_id":"8472","abstract":[{"text":"Zukünftige mechatronische Systeme entwickeln sich mehr und mehr zu intelligenten technischen Systemen, die durch eine zunehmende Verzahnung der mechanischen, elektrischen und informationsverarbeitenden Anteile gekennzeichnet sind. Um das Zusammenspiel der Disziplinen besser zu beherrschen, werden zunehmend Methoden und disziplinübergreifende Systemmodelle des Systems Engineering genutzt. Offene Probleme sind dabei noch die Nachverfolgbarkeit der Entwicklung (Traceability) und die Verwaltung zueinander konsistenter Versionen von disziplinübergreifenden und disziplinspezifischen Modellen. Dieser Beitrag adressiert diese Probleme durch die Verknüpfung der Spezifikationstechnik CONSENS für den Systementwurf mit dem Datenmanagementwerkzeug SYNECT. Der Beitrag stellt die Konzipierung und prototypische Werkzeugunterstützung für die Verknüpfung von Systemmodellen und disziplinspezifischen MATLAB/Simulink-Modellen vor.\r\n","lang":"eng"}]},{"_id":"20970","date_updated":"2022-01-06T06:54:42Z","language":[{"iso":"eng"}],"type":"conference","year":"2015","citation":{"short":"J. Meyer, M. Fockel, J. Holtmann, in: Tag Des Systems Engineering 2015, Gesellschaft für Systems Engineering e.V., 2015.","ieee":"J. Meyer, M. Fockel, and J. Holtmann, “Systementwurf unter Einbeziehung funktionaler Sicherheit bei automobilen Steuergeräten,” in Tag des Systems Engineering 2015, 2015.","chicago":"Meyer, Jan, Markus Fockel, and Jörg Holtmann. “Systementwurf Unter Einbeziehung Funktionaler Sicherheit Bei Automobilen Steuergeräten.” In Tag Des Systems Engineering 2015. Gesellschaft für Systems Engineering e.V., 2015.","apa":"Meyer, J., Fockel, M., & Holtmann, J. (2015). Systementwurf unter Einbeziehung funktionaler Sicherheit bei automobilen Steuergeräten. In Tag des Systems Engineering 2015. Gesellschaft für Systems Engineering e.V.","ama":"Meyer J, Fockel M, Holtmann J. Systementwurf unter Einbeziehung funktionaler Sicherheit bei automobilen Steuergeräten. In: Tag Des Systems Engineering 2015. Gesellschaft für Systems Engineering e.V.; 2015.","bibtex":"@inproceedings{Meyer_Fockel_Holtmann_2015, title={Systementwurf unter Einbeziehung funktionaler Sicherheit bei automobilen Steuergeräten}, booktitle={Tag des Systems Engineering 2015}, publisher={Gesellschaft für Systems Engineering e.V.}, author={Meyer, Jan and Fockel, Markus and Holtmann, Jörg}, year={2015} }","mla":"Meyer, Jan, et al. “Systementwurf Unter Einbeziehung Funktionaler Sicherheit Bei Automobilen Steuergeräten.” Tag Des Systems Engineering 2015, Gesellschaft für Systems Engineering e.V., 2015."},"abstract":[{"lang":"ger","text":"Automobile Steuergeräte realisieren mehr und mehr sicherheitskritische Funktionen. Nicht erst durch die Einführung der ISO 26262 werden an die Entwicklung sicherheitskritischer Funktionen besondere Anforderungen zum Beispiel in Form von Sicherheitsanalysen gestellt. In der Praxis hat sich herausgestellt, dass durch den bisherigen Systementwurf nicht alle notwendigen Daten für die Sicherheitsanalysen vorlagen. Von daher war eine Erweiterung des bisherigen Vorgehens erforderlich, sodass die benötigten Daten zu den erforderlichen Zeitpunkten vorliegen und die Sicherheitsanalysen ohne aufwendige Nacharbeiten erstellt werden können. Dieser Artikel beschreibt die durchgeführten Erweiterungen und die Erfahrungen, die in Serienprojekten eines automobilen Zulieferers gesammelt wurden."}],"user_id":"8472","title":"Systementwurf unter Einbeziehung funktionaler Sicherheit bei automobilen Steuergeräten","author":[{"first_name":"Jan","full_name":"Meyer, Jan","last_name":"Meyer"},{"orcid":"0000-0002-1269-0702","full_name":"Fockel, Markus","first_name":"Markus","id":"8472","last_name":"Fockel"},{"id":"3875","last_name":"Holtmann","orcid":"0000-0001-6141-4571","full_name":"Holtmann, Jörg","first_name":"Jörg"}],"publisher":"Gesellschaft für Systems Engineering e.V.","department":[{"_id":"241"},{"_id":"662"}],"publication":"Tag des Systems Engineering 2015","status":"public","date_created":"2021-01-13T13:04:04Z"},{"date_updated":"2022-01-06T06:54:42Z","_id":"20971","year":"2015","citation":{"bibtex":"@inproceedings{Fockel_Holtmann_2015, title={ReqPat: Efficient Documentation of High-quality Requirements using Controlled Natural Language}, booktitle={Proc. of the 23rd International Requirements Engineering Conference 2015 (RE15)}, publisher={IEEE}, author={Fockel, Markus and Holtmann, Jörg}, year={2015} }","mla":"Fockel, Markus, and Jörg Holtmann. “ReqPat: Efficient Documentation of High-Quality Requirements Using Controlled Natural Language.” Proc. of the 23rd International Requirements Engineering Conference 2015 (RE15), IEEE, 2015.","chicago":"Fockel, Markus, and Jörg Holtmann. “ReqPat: Efficient Documentation of High-Quality Requirements Using Controlled Natural Language.” In Proc. of the 23rd International Requirements Engineering Conference 2015 (RE15). IEEE, 2015.","ama":"Fockel M, Holtmann J. ReqPat: Efficient Documentation of High-quality Requirements using Controlled Natural Language. In: Proc. of the 23rd International Requirements Engineering Conference 2015 (RE15). IEEE; 2015.","apa":"Fockel, M., & Holtmann, J. (2015). ReqPat: Efficient Documentation of High-quality Requirements using Controlled Natural Language. In Proc. of the 23rd International Requirements Engineering Conference 2015 (RE15). IEEE.","ieee":"M. Fockel and J. Holtmann, “ReqPat: Efficient Documentation of High-quality Requirements using Controlled Natural Language,” in Proc. of the 23rd International Requirements Engineering Conference 2015 (RE15), 2015.","short":"M. Fockel, J. Holtmann, in: Proc. of the 23rd International Requirements Engineering Conference 2015 (RE15), IEEE, 2015."},"type":"conference","language":[{"iso":"eng"}],"abstract":[{"lang":"eng","text":"The growing complexity of today's software intensive systems results in an increased size of requirements specifications, which are typically documented by means of natural language (NL). Large NL requirements specifications are prone to contain defects (e.g., contradictions), and the inherent ambiguity of NL impedes automatic techniques to support the requirements engineer. In order to cope with this problem, we conceived a requirements documentation approach implemented in the tool ReqPat. Using a controlled NL, it supports an efficient requirements documentation, an automatic requirements validation, and an automatic transition to models--while still keeping the requirements understandable for all stakeholders.\r\n"}],"title":"ReqPat: Efficient Documentation of High-quality Requirements using Controlled Natural Language","user_id":"8472","author":[{"id":"8472","last_name":"Fockel","full_name":"Fockel, Markus","orcid":"0000-0002-1269-0702","first_name":"Markus"},{"id":"3875","last_name":"Holtmann","orcid":"0000-0001-6141-4571","full_name":"Holtmann, Jörg","first_name":"Jörg"}],"publisher":"IEEE","department":[{"_id":"241"},{"_id":"662"}],"publication":"Proc. of the 23rd International Requirements Engineering Conference 2015 (RE15)","status":"public","date_created":"2021-01-13T13:05:20Z"},{"citation":{"short":"J. Holtmann, R. Bernijazov, M. Meyer, D. Schmelter, C. Tschirner, in: Proceedings of the 2015 International Conference on Software and System Process, 2015.","ieee":"J. Holtmann, R. Bernijazov, M. Meyer, D. Schmelter, and C. Tschirner, “Integrated systems engineering and software requirements engineering for technical systems,” in Proceedings of the 2015 International Conference on Software and System Process, 2015.","ama":"Holtmann J, Bernijazov R, Meyer M, Schmelter D, Tschirner C. Integrated systems engineering and software requirements engineering for technical systems. In: Proceedings of the 2015 International Conference on Software and System Process. ; 2015. doi:10.1145/2785592.2785597","apa":"Holtmann, J., Bernijazov, R., Meyer, M., Schmelter, D., & Tschirner, C. (2015). Integrated systems engineering and software requirements engineering for technical systems. In Proceedings of the 2015 International Conference on Software and System Process. https://doi.org/10.1145/2785592.2785597","chicago":"Holtmann, Jörg, Ruslan Bernijazov, Matthias Meyer, David Schmelter, and Christian Tschirner. “Integrated Systems Engineering and Software Requirements Engineering for Technical Systems.” In Proceedings of the 2015 International Conference on Software and System Process, 2015. https://doi.org/10.1145/2785592.2785597.","bibtex":"@inproceedings{Holtmann_Bernijazov_Meyer_Schmelter_Tschirner_2015, title={Integrated systems engineering and software requirements engineering for technical systems}, DOI={10.1145/2785592.2785597}, booktitle={Proceedings of the 2015 International Conference on Software and System Process}, author={Holtmann, Jörg and Bernijazov, Ruslan and Meyer, Matthias and Schmelter, David and Tschirner, Christian}, year={2015} }","mla":"Holtmann, Jörg, et al. “Integrated Systems Engineering and Software Requirements Engineering for Technical Systems.” Proceedings of the 2015 International Conference on Software and System Process, 2015, doi:10.1145/2785592.2785597."},"type":"conference","year":"2015","language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:54:41Z","_id":"20899","doi":"10.1145/2785592.2785597","author":[{"id":"3875","last_name":"Holtmann","full_name":"Holtmann, Jörg","orcid":"0000-0001-6141-4571","first_name":"Jörg"},{"full_name":"Bernijazov, Ruslan","first_name":"Ruslan","last_name":"Bernijazov"},{"first_name":"Matthias","full_name":"Meyer, Matthias","last_name":"Meyer","id":"683"},{"first_name":"David","orcid":"0000-0001-7787-5380","full_name":"Schmelter, David","last_name":"Schmelter","id":"40982"},{"full_name":"Tschirner, Christian","first_name":"Christian","last_name":"Tschirner"}],"publication":"Proceedings of the 2015 International Conference on Software and System Process","department":[{"_id":"241"},{"_id":"662"}],"publication_status":"published","publication_identifier":{"isbn":["9781450333467"]},"status":"public","date_created":"2021-01-12T13:46:56Z","abstract":[{"text":"The development of software-intensive technical systems (e.g., within the automotive industry) involves several engineering disciplines like mechanical, electrical, control, and software engineering. Model-based Systems Engineering (MBSE) coordinates these disciplines throughout the development by means of discipline-spanning processes and system models. Such a system model provides a common understanding of the system under development and serves as a starting point for the discipline-specific development. An integral part of MBSE is the requirements engineering on the system level. However, for the discipline-specific development to start, these requirements need to be refined, e.g., into specific requirements for the embedded software. Since existing MBSE approaches lack support for this refinement step, we conceived a systematic transition from MBSE to model-based software requirements engineering, which we present in this paper. We automated the steps of the transition where possible, in order to avoid error-prone and time-consuming manual tasks. We illustrate the approach with an example of an automotive embedded system.\r\n","lang":"eng"}],"title":"Integrated systems engineering and software requirements engineering for technical systems","user_id":"40982"},{"volume":343,"editor":[{"full_name":"Gausemeier, Jürgen","first_name":"Jürgen","last_name":"Gausemeier"},{"last_name":"Dumitrescu","first_name":"Roman","full_name":"Dumitrescu, Roman"},{"last_name":"Rammig","first_name":"Franz-Josef","full_name":"Rammig, Franz-Josef"},{"last_name":"Schäfer","first_name":"Wilhelm","full_name":"Schäfer, Wilhelm"},{"full_name":"Trächtler, Ansgar","first_name":"Ansgar","last_name":"Trächtler"}],"date_created":"2021-01-12T13:56:52Z","status":"public","publication":"10. Paderborner Workshop Entwurf mechatronischer Systeme","department":[{"_id":"76"},{"_id":"241"},{"_id":"662"}],"publisher":"Heinz Nixdorf Institut","author":[{"last_name":"Meyer","first_name":"Jan","full_name":"Meyer, Jan"},{"last_name":"Holtmann","id":"3875","first_name":"Jörg","full_name":"Holtmann, Jörg","orcid":"0000-0001-6141-4571"},{"id":"13616","last_name":"Koch","full_name":"Koch, Thorsten","first_name":"Thorsten"},{"full_name":"Meyer, Matthias","first_name":"Matthias","id":"683","last_name":"Meyer"}],"title":"Generierung von AUTOSAR-Modellen aus UML-Spezifikationen","user_id":"5786","abstract":[{"text":"Die Komplexität moderner Fahrzeuge steigt aufgrund der zunehmenden Anzahl von Funktionen, die durch elektronische Systeme umgesetzt werden. Insbesondere nehmen die Abhängigkeiten zwischen den an der Entwicklung beteiligten Fachdisziplinen und der Softwareanteil massiv zu. Wir haben einen für die Automobilindustrie angepassten, zum Reifegradmodell Automotive SPICE konformen Prozess für die Entwicklung von Steuergeräten konzipiert, der ein fachdisziplinübergreifendes Systems Engineering und einen systematischen Übergang in die Softwareentwicklung unterstützt. Im Kontext dieses Entwicklungsprozess beschreiben wir in diesem Beitrag den Übergang vom UML-basierten Softwareentwurf zum in der Automobilindustrie etablierten AUTOSAR-Standard mit Hilfe einer automatischen Modelltransformation. So werden fehleranfällige und zeitaufwändige manuelle Tätigkeiten reduziert. Wir haben die Generierung von AUTOSAR-Modellen gemeinsam mit dem international tätigen Automobilzulieferer Hella KGaA Hueck & Co. in seriennahen Entwicklungsprojekten praktisch erprobt und Zeit- und Kostenersparnisse festgestellt.","lang":"ger"}],"page":"159–172","type":"conference","citation":{"bibtex":"@inproceedings{Meyer_Holtmann_Koch_Meyer_2015, series={Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn}, title={Generierung von AUTOSAR-Modellen aus UML-Spezifikationen}, volume={343}, booktitle={10. Paderborner Workshop Entwurf mechatronischer Systeme}, publisher={Heinz Nixdorf Institut}, author={Meyer, Jan and Holtmann, Jörg and Koch, Thorsten and Meyer, Matthias}, editor={Gausemeier, Jürgen and Dumitrescu, Roman and Rammig, Franz-Josef and Schäfer, Wilhelm and Trächtler, Ansgar}, year={2015}, pages={159–172}, collection={Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn} }","mla":"Meyer, Jan, et al. “Generierung von AUTOSAR-Modellen Aus UML-Spezifikationen.” 10. Paderborner Workshop Entwurf Mechatronischer Systeme, edited by Jürgen Gausemeier et al., vol. 343, Heinz Nixdorf Institut, 2015, pp. 159–172.","apa":"Meyer, J., Holtmann, J., Koch, T., & Meyer, M. (2015). Generierung von AUTOSAR-Modellen aus UML-Spezifikationen. In J. Gausemeier, R. Dumitrescu, F.-J. Rammig, W. Schäfer, & A. Trächtler (Eds.), 10. Paderborner Workshop Entwurf mechatronischer Systeme (Vol. 343, pp. 159–172). Heinz Nixdorf Institut.","ama":"Meyer J, Holtmann J, Koch T, Meyer M. Generierung von AUTOSAR-Modellen aus UML-Spezifikationen. In: Gausemeier J, Dumitrescu R, Rammig F-J, Schäfer W, Trächtler A, eds. 10. Paderborner Workshop Entwurf Mechatronischer Systeme. Vol 343. Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn. Heinz Nixdorf Institut; 2015:159–172.","chicago":"Meyer, Jan, Jörg Holtmann, Thorsten Koch, and Matthias Meyer. “Generierung von AUTOSAR-Modellen Aus UML-Spezifikationen.” In 10. Paderborner Workshop Entwurf Mechatronischer Systeme, edited by Jürgen Gausemeier, Roman Dumitrescu, Franz-Josef Rammig, Wilhelm Schäfer, and Ansgar Trächtler, 343:159–172. Verlagsschriftenreihe Des Heinz Nixdorf Instituts, Paderborn. Heinz Nixdorf Institut, 2015.","ieee":"J. Meyer, J. Holtmann, T. Koch, and M. Meyer, “Generierung von AUTOSAR-Modellen aus UML-Spezifikationen,” in 10. Paderborner Workshop Entwurf mechatronischer Systeme, 2015, vol. 343, pp. 159–172.","short":"J. Meyer, J. Holtmann, T. Koch, M. Meyer, in: J. Gausemeier, R. Dumitrescu, F.-J. Rammig, W. Schäfer, A. Trächtler (Eds.), 10. Paderborner Workshop Entwurf Mechatronischer Systeme, Heinz Nixdorf Institut, 2015, pp. 159–172."},"year":"2015","language":[{"iso":"eng"}],"series_title":"Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn","_id":"20902","date_updated":"2022-01-06T06:54:41Z","intvolume":" 343"},{"publication_identifier":{"isbn":["9781479963430"]},"publication_status":"published","status":"public","date_created":"2021-01-13T13:06:57Z","author":[{"first_name":"Markus","full_name":"Fockel, Markus","orcid":"0000-0002-1269-0702","last_name":"Fockel","id":"8472"},{"first_name":"Jörg","full_name":"Holtmann, Jörg","orcid":"0000-0001-6141-4571","last_name":"Holtmann","id":"3875"}],"department":[{"_id":"241"},{"_id":"662"}],"publication":"2014 IEEE 4th International Model-Driven Requirements Engineering Workshop (MoDRE)","title":"A requirements engineering methodology combining models and controlled natural language","user_id":"8472","abstract":[{"lang":"eng","text":"The use of models in requirements engineering (RE) for software-intensive embedded systems is considered beneficial. The main advantages of requirements models as documentation format are that they facilitate requirements understanding and foster automatic analysis techniques. However, natural language (NL) is still the dominant documentation format for requirements specifications, particularly in the domain of embedded systems. This is due to the facts that NL-based requirements can be used within legally binding documents and are more appropriate for reviews than models. In order to bridge the gap between both of these documentation formats, this paper proposes a model-driven RE methodology that makes use of requirements models along with a controlled natural language. The methodology combines the advantages of model-based and NL-based documentation by means of a bidirectional multi-step model transformation between both documentation formats. We illustrate the approach by means of an automotive example, explain the particular steps of the model transformation, and present performance results.\r\n"}],"citation":{"short":"M. Fockel, J. Holtmann, in: 2014 IEEE 4th International Model-Driven Requirements Engineering Workshop (MoDRE), 2014.","ieee":"M. Fockel and J. Holtmann, “A requirements engineering methodology combining models and controlled natural language,” in 2014 IEEE 4th International Model-Driven Requirements Engineering Workshop (MoDRE), 2014.","chicago":"Fockel, Markus, and Jörg Holtmann. “A Requirements Engineering Methodology Combining Models and Controlled Natural Language.” In 2014 IEEE 4th International Model-Driven Requirements Engineering Workshop (MoDRE), 2014. https://doi.org/10.1109/modre.2014.6890827.","apa":"Fockel, M., & Holtmann, J. (2014). A requirements engineering methodology combining models and controlled natural language. In 2014 IEEE 4th International Model-Driven Requirements Engineering Workshop (MoDRE). https://doi.org/10.1109/modre.2014.6890827","ama":"Fockel M, Holtmann J. A requirements engineering methodology combining models and controlled natural language. In: 2014 IEEE 4th International Model-Driven Requirements Engineering Workshop (MoDRE). ; 2014. doi:10.1109/modre.2014.6890827","bibtex":"@inproceedings{Fockel_Holtmann_2014, title={A requirements engineering methodology combining models and controlled natural language}, DOI={10.1109/modre.2014.6890827}, booktitle={2014 IEEE 4th International Model-Driven Requirements Engineering Workshop (MoDRE)}, author={Fockel, Markus and Holtmann, Jörg}, year={2014} }","mla":"Fockel, Markus, and Jörg Holtmann. “A Requirements Engineering Methodology Combining Models and Controlled Natural Language.” 2014 IEEE 4th International Model-Driven Requirements Engineering Workshop (MoDRE), 2014, doi:10.1109/modre.2014.6890827."},"type":"conference","year":"2014","language":[{"iso":"eng"}],"doi":"10.1109/modre.2014.6890827","_id":"20972","date_updated":"2022-01-06T06:54:42Z"}]