[{"type":"misc","abstract":[{"lang":"eng","text":"Modern vehicles are becoming more connected and autonomous, and more software-defined in general. Such connectivity leads to security risks due to the increased attack surface for external intrusions. In addition, attacks can also lead to safety hazards as cars contain multiple safety-critical components. Therefore both safety and security must be considered in combination. In this whitepaper, we describe a tool-supported analysis method aligned with automotive standards to identify safety and security dependencies and automatically derive corresponding test cases. These test cases can be imported into the existing dSPACE tool chain to improve efficiency by reducing time-consuming manual work and susceptibility to errors. Thereby, our method brings together system design and testing phases to pave the way for an integrated safety and security-by-design life cycle in the automotive domain."}],"status":"public","_id":"59601","user_id":"49934","department":[{"_id":"241"},{"_id":"662"}],"language":[{"iso":"eng"}],"publication_status":"published","related_material":{"link":[{"relation":"other","url":"https://www.iem.fraunhofer.de/de/newsroom/presse-und-news/fraunhofer-iem-dspace-veroeffentlichen-whitepaper.html"}]},"year":"2024","citation":{"ama":"Trentinaglia R, Fockel M, Pukrop M, Schaeffer T. <i>Whitepaper: From HARA and TARA to Risk-Based Safety and Security Dependency Testing</i>. dSPACE GmbH; 2024.","chicago":"Trentinaglia, Roman, Markus Fockel, Matthias Pukrop, and Tobias Schaeffer. <i>Whitepaper: From HARA and TARA to Risk-Based Safety and Security Dependency Testing</i>. dSPACE GmbH, 2024.","ieee":"R. Trentinaglia, M. Fockel, M. Pukrop, and T. Schaeffer, <i>Whitepaper: From HARA and TARA to Risk-Based Safety and Security Dependency Testing</i>. dSPACE GmbH, 2024.","short":"R. Trentinaglia, M. Fockel, M. Pukrop, T. Schaeffer, Whitepaper: From HARA and TARA to Risk-Based Safety and Security Dependency Testing, dSPACE GmbH, 2024.","mla":"Trentinaglia, Roman, et al. <i>Whitepaper: From HARA and TARA to Risk-Based Safety and Security Dependency Testing</i>. dSPACE GmbH, 2024.","bibtex":"@book{Trentinaglia_Fockel_Pukrop_Schaeffer_2024, title={Whitepaper: From HARA and TARA to Risk-Based Safety and Security Dependency Testing}, publisher={dSPACE GmbH}, author={Trentinaglia, Roman and Fockel, Markus and Pukrop, Matthias and Schaeffer, Tobias}, year={2024} }","apa":"Trentinaglia, R., Fockel, M., Pukrop, M., &#38; Schaeffer, T. (2024). <i>Whitepaper: From HARA and TARA to Risk-Based Safety and Security Dependency Testing</i>. dSPACE GmbH."},"page":"5","publisher":"dSPACE GmbH","date_updated":"2025-04-16T09:30:29Z","author":[{"orcid":"0000-0001-9728-4991","last_name":"Trentinaglia","id":"49934","full_name":"Trentinaglia, Roman","first_name":"Roman"},{"first_name":"Markus","last_name":"Fockel","orcid":"0000-0002-1269-0702","id":"8472","full_name":"Fockel, Markus"},{"full_name":"Pukrop, Matthias","last_name":"Pukrop","first_name":"Matthias"},{"first_name":"Tobias","full_name":"Schaeffer, Tobias","last_name":"Schaeffer"}],"date_created":"2025-04-16T09:30:13Z","title":"Whitepaper: From HARA and TARA to Risk-Based Safety and Security Dependency Testing","main_file_link":[{"url":"https://www.iem.fraunhofer.de/content/dam/iem/dokumente/termine/whitepaper_safety-and-security_06_240527_e-v11.pdf"}]},{"citation":{"chicago":"Trentinaglia, Roman, Markus Fockel, Matthias Pukrop, and Tobias Schaeffer. “Automatically Deriving Test Cases from Safety-Security Dependencies.” In <i>22th Escar Europe : The World’s Leading Automotive Cyber Security Conference : Embedded Security in Cars (Dortmund, 19. - 20.11.2024)</i>, 2024. <a href=\"https://doi.org/10.13154/294-12716\">https://doi.org/10.13154/294-12716</a>.","ieee":"R. Trentinaglia, M. Fockel, M. Pukrop, and T. Schaeffer, “Automatically deriving test cases from safety-security dependencies,” 2024, doi: <a href=\"https://doi.org/10.13154/294-12716\">10.13154/294-12716</a>.","ama":"Trentinaglia R, Fockel M, Pukrop M, Schaeffer T. Automatically deriving test cases from safety-security dependencies. In: <i>22th Escar Europe : The World’s Leading Automotive Cyber Security Conference : Embedded Security in Cars (Dortmund, 19. - 20.11.2024)</i>. ; 2024. doi:<a href=\"https://doi.org/10.13154/294-12716\">10.13154/294-12716</a>","bibtex":"@inproceedings{Trentinaglia_Fockel_Pukrop_Schaeffer_2024, title={Automatically deriving test cases from safety-security dependencies}, DOI={<a href=\"https://doi.org/10.13154/294-12716\">10.13154/294-12716</a>}, booktitle={22th escar Europe : The World’s Leading Automotive Cyber Security Conference : Embedded Security in Cars (Dortmund, 19. - 20.11.2024)}, author={Trentinaglia, Roman and Fockel, Markus and Pukrop, Matthias and Schaeffer, Tobias}, year={2024} }","mla":"Trentinaglia, Roman, et al. “Automatically Deriving Test Cases from Safety-Security Dependencies.” <i>22th Escar Europe : The World’s Leading Automotive Cyber Security Conference : Embedded Security in Cars (Dortmund, 19. - 20.11.2024)</i>, 2024, doi:<a href=\"https://doi.org/10.13154/294-12716\">10.13154/294-12716</a>.","short":"R. Trentinaglia, M. Fockel, M. Pukrop, T. Schaeffer, in: 22th Escar Europe : The World’s Leading Automotive Cyber Security Conference : Embedded Security in Cars (Dortmund, 19. - 20.11.2024), 2024.","apa":"Trentinaglia, R., Fockel, M., Pukrop, M., &#38; Schaeffer, T. (2024). Automatically deriving test cases from safety-security dependencies. <i>22th Escar Europe : The World’s Leading Automotive Cyber Security Conference : Embedded Security in Cars (Dortmund, 19. - 20.11.2024)</i>. <a href=\"https://doi.org/10.13154/294-12716\">https://doi.org/10.13154/294-12716</a>"},"year":"2024","author":[{"id":"49934","full_name":"Trentinaglia, Roman","orcid":"0000-0001-9728-4991","last_name":"Trentinaglia","first_name":"Roman"},{"full_name":"Fockel, Markus","id":"8472","orcid":"0000-0002-1269-0702","last_name":"Fockel","first_name":"Markus"},{"full_name":"Pukrop, Matthias","last_name":"Pukrop","first_name":"Matthias"},{"first_name":"Tobias","last_name":"Schaeffer","full_name":"Schaeffer, Tobias"}],"date_created":"2024-12-04T14:55:47Z","date_updated":"2025-05-19T09:31:29Z","doi":"10.13154/294-12716","title":"Automatically deriving test cases from safety-security dependencies","type":"conference","publication":"22th escar Europe : The World’s Leading Automotive Cyber Security Conference : Embedded Security in Cars (Dortmund, 19. - 20.11.2024)","status":"public","user_id":"49934","department":[{"_id":"241"},{"_id":"662"}],"_id":"57578","language":[{"iso":"eng"}]},{"citation":{"short":"E. Bodden, J. Pottebaum, M. Fockel, I. Gräßler, IEEE Security &#38; Privacy 22 (2024) 69–72.","bibtex":"@article{Bodden_Pottebaum_Fockel_Gräßler_2024, title={Evaluating Security Through Isolation and Defense in Depth}, volume={22}, DOI={<a href=\"https://doi.org/10.1109/msec.2023.3336028\">10.1109/msec.2023.3336028</a>}, number={1}, journal={IEEE Security &#38; Privacy}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Bodden, Eric and Pottebaum, Jens and Fockel, Markus and Gräßler, Iris}, year={2024}, pages={69–72} }","mla":"Bodden, Eric, et al. “Evaluating Security Through Isolation and Defense in Depth.” <i>IEEE Security &#38; Privacy</i>, vol. 22, no. 1, Institute of Electrical and Electronics Engineers (IEEE), 2024, pp. 69–72, doi:<a href=\"https://doi.org/10.1109/msec.2023.3336028\">10.1109/msec.2023.3336028</a>.","apa":"Bodden, E., Pottebaum, J., Fockel, M., &#38; Gräßler, I. (2024). Evaluating Security Through Isolation and Defense in Depth. <i>IEEE Security &#38; Privacy</i>, <i>22</i>(1), 69–72. <a href=\"https://doi.org/10.1109/msec.2023.3336028\">https://doi.org/10.1109/msec.2023.3336028</a>","ieee":"E. Bodden, J. Pottebaum, M. Fockel, and I. Gräßler, “Evaluating Security Through Isolation and Defense in Depth,” <i>IEEE Security &#38; Privacy</i>, vol. 22, no. 1, pp. 69–72, 2024, doi: <a href=\"https://doi.org/10.1109/msec.2023.3336028\">10.1109/msec.2023.3336028</a>.","chicago":"Bodden, Eric, Jens Pottebaum, Markus Fockel, and Iris Gräßler. “Evaluating Security Through Isolation and Defense in Depth.” <i>IEEE Security &#38; Privacy</i> 22, no. 1 (2024): 69–72. <a href=\"https://doi.org/10.1109/msec.2023.3336028\">https://doi.org/10.1109/msec.2023.3336028</a>.","ama":"Bodden E, Pottebaum J, Fockel M, Gräßler I. Evaluating Security Through Isolation and Defense in Depth. <i>IEEE Security &#38; Privacy</i>. 2024;22(1):69-72. doi:<a href=\"https://doi.org/10.1109/msec.2023.3336028\">10.1109/msec.2023.3336028</a>"},"intvolume":"        22","page":"69-72","year":"2024","issue":"1","publication_status":"published","quality_controlled":"1","publication_identifier":{"issn":["1540-7993","1558-4046"]},"main_file_link":[{"url":"https://ieeexplore.ieee.org/document/10411721"}],"doi":"10.1109/msec.2023.3336028","title":"Evaluating Security Through Isolation and Defense in Depth","author":[{"last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","id":"59256","first_name":"Eric"},{"first_name":"Jens","orcid":"http://orcid.org/0000-0001-8778-2989","last_name":"Pottebaum","full_name":"Pottebaum, Jens","id":"405"},{"first_name":"Markus","full_name":"Fockel, Markus","id":"8472","orcid":"0000-0002-1269-0702","last_name":"Fockel"},{"orcid":"0000-0001-5765-971X","last_name":"Gräßler","full_name":"Gräßler, Iris","id":"47565","first_name":"Iris"}],"date_created":"2024-03-15T20:16:18Z","volume":22,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","date_updated":"2026-03-31T02:19:49Z","status":"public","type":"journal_article","publication":"IEEE Security & Privacy","language":[{"iso":"eng"}],"keyword":["Law","Electrical and Electronic Engineering","Computer Networks and Communications"],"user_id":"405","department":[{"_id":"152"},{"_id":"76"},{"_id":"662"}],"_id":"52587"},{"status":"public","type":"conference","publication":"REFSQ 2023: Requirements Engineering: Foundation for Software Quality","language":[{"iso":"eng"}],"_id":"43395","user_id":"8472","department":[{"_id":"241"},{"_id":"662"}],"place":"Cham","year":"2023","citation":{"ama":"Trentinaglia R, Merschjohann S, Fockel M, Eikerling H. Eliciting Security Requirements – An Experience Report. In: <i>REFSQ 2023: Requirements Engineering: Foundation for Software Quality</i>. Springer Nature Switzerland; 2023. doi:<a href=\"https://doi.org/10.1007/978-3-031-29786-1_25\">10.1007/978-3-031-29786-1_25</a>","ieee":"R. Trentinaglia, S. Merschjohann, M. Fockel, and H. Eikerling, “Eliciting Security Requirements – An Experience Report,” 2023, doi: <a href=\"https://doi.org/10.1007/978-3-031-29786-1_25\">10.1007/978-3-031-29786-1_25</a>.","chicago":"Trentinaglia, Roman, Sven Merschjohann, Markus Fockel, and Hendrik Eikerling. “Eliciting Security Requirements – An Experience Report.” In <i>REFSQ 2023: Requirements Engineering: Foundation for Software Quality</i>. Cham: Springer Nature Switzerland, 2023. <a href=\"https://doi.org/10.1007/978-3-031-29786-1_25\">https://doi.org/10.1007/978-3-031-29786-1_25</a>.","apa":"Trentinaglia, R., Merschjohann, S., Fockel, M., &#38; Eikerling, H. (2023). Eliciting Security Requirements – An Experience Report. <i>REFSQ 2023: Requirements Engineering: Foundation for Software Quality</i>. <a href=\"https://doi.org/10.1007/978-3-031-29786-1_25\">https://doi.org/10.1007/978-3-031-29786-1_25</a>","bibtex":"@inproceedings{Trentinaglia_Merschjohann_Fockel_Eikerling_2023, place={Cham}, title={Eliciting Security Requirements – An Experience Report}, DOI={<a href=\"https://doi.org/10.1007/978-3-031-29786-1_25\">10.1007/978-3-031-29786-1_25</a>}, booktitle={REFSQ 2023: Requirements Engineering: Foundation for Software Quality}, publisher={Springer Nature Switzerland}, author={Trentinaglia, Roman and Merschjohann, Sven and Fockel, Markus and Eikerling, Hendrik}, year={2023} }","mla":"Trentinaglia, Roman, et al. “Eliciting Security Requirements – An Experience Report.” <i>REFSQ 2023: Requirements Engineering: Foundation for Software Quality</i>, Springer Nature Switzerland, 2023, doi:<a href=\"https://doi.org/10.1007/978-3-031-29786-1_25\">10.1007/978-3-031-29786-1_25</a>.","short":"R. Trentinaglia, S. Merschjohann, M. Fockel, H. Eikerling, in: REFSQ 2023: Requirements Engineering: Foundation for Software Quality, Springer Nature Switzerland, Cham, 2023."},"publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783031297854","9783031297861"]},"title":"Eliciting Security Requirements – An Experience Report","doi":"10.1007/978-3-031-29786-1_25","publisher":"Springer Nature Switzerland","date_updated":"2023-04-04T12:51:41Z","author":[{"first_name":"Roman","orcid":"0000-0001-9728-4991","last_name":"Trentinaglia","id":"49934","full_name":"Trentinaglia, Roman"},{"id":"11394","full_name":"Merschjohann, Sven","last_name":"Merschjohann","first_name":"Sven"},{"first_name":"Markus","last_name":"Fockel","orcid":"0000-0002-1269-0702","full_name":"Fockel, Markus","id":"8472"},{"id":"29279","full_name":"Eikerling, Hendrik","last_name":"Eikerling","first_name":"Hendrik"}],"date_created":"2023-04-04T12:47:31Z"},{"type":"conference","publication":"Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development","status":"public","user_id":"49934","department":[{"_id":"241"},{"_id":"662"}],"_id":"29847","language":[{"iso":"eng"}],"publication_status":"published","citation":{"ama":"Fockel M, Schubert D, Trentinaglia R, Schulz H, Kirmair W. Semi-automatic Integrated Safety and Security Analysis for Automotive Systems. In: <i>Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development</i>. SCITEPRESS - Science and Technology Publications; 2022. doi:<a href=\"https://doi.org/10.5220/0010778500003119\">10.5220/0010778500003119</a>","ieee":"M. Fockel, D. Schubert, R. Trentinaglia, H. Schulz, and W. Kirmair, “Semi-automatic Integrated Safety and Security Analysis for Automotive Systems,” 2022, doi: <a href=\"https://doi.org/10.5220/0010778500003119\">10.5220/0010778500003119</a>.","chicago":"Fockel, Markus, David Schubert, Roman Trentinaglia, Hannes Schulz, and Wolfgang Kirmair. “Semi-Automatic Integrated Safety and Security Analysis for Automotive Systems.” In <i>Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development</i>. SCITEPRESS - Science and Technology Publications, 2022. <a href=\"https://doi.org/10.5220/0010778500003119\">https://doi.org/10.5220/0010778500003119</a>.","short":"M. Fockel, D. Schubert, R. Trentinaglia, H. Schulz, W. Kirmair, in: Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development, SCITEPRESS - Science and Technology Publications, 2022.","mla":"Fockel, Markus, et al. “Semi-Automatic Integrated Safety and Security Analysis for Automotive Systems.” <i>Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development</i>, SCITEPRESS - Science and Technology Publications, 2022, doi:<a href=\"https://doi.org/10.5220/0010778500003119\">10.5220/0010778500003119</a>.","bibtex":"@inproceedings{Fockel_Schubert_Trentinaglia_Schulz_Kirmair_2022, title={Semi-automatic Integrated Safety and Security Analysis for Automotive Systems}, DOI={<a href=\"https://doi.org/10.5220/0010778500003119\">10.5220/0010778500003119</a>}, booktitle={Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development}, publisher={SCITEPRESS - Science and Technology Publications}, author={Fockel, Markus and Schubert, David and Trentinaglia, Roman and Schulz, Hannes and Kirmair, Wolfgang}, year={2022} }","apa":"Fockel, M., Schubert, D., Trentinaglia, R., Schulz, H., &#38; Kirmair, W. (2022). Semi-automatic Integrated Safety and Security Analysis for Automotive Systems. <i>Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development</i>. <a href=\"https://doi.org/10.5220/0010778500003119\">https://doi.org/10.5220/0010778500003119</a>"},"year":"2022","date_created":"2022-02-15T08:07:15Z","author":[{"first_name":"Markus","orcid":"0000-0002-1269-0702","last_name":"Fockel","full_name":"Fockel, Markus","id":"8472"},{"first_name":"David","last_name":"Schubert","id":"9106","full_name":"Schubert, David"},{"first_name":"Roman","full_name":"Trentinaglia, Roman","id":"49934","last_name":"Trentinaglia","orcid":"0000-0001-9728-4991"},{"first_name":"Hannes","full_name":"Schulz, Hannes","last_name":"Schulz"},{"first_name":"Wolfgang","last_name":"Kirmair","full_name":"Kirmair, Wolfgang"}],"publisher":"SCITEPRESS - Science and Technology Publications","date_updated":"2022-02-15T08:14:07Z","doi":"10.5220/0010778500003119","title":"Semi-automatic Integrated Safety and Security Analysis for Automotive Systems"},{"publication_status":"published","publication_identifier":{"issn":["1619-1366","1619-1374"]},"year":"2022","citation":{"ieee":"J. Holtmann, J. Deantoni, and M. Fockel, “Early timing analysis based on scenario requirements and platform models,” <i>Software and Systems Modeling</i>, 2022, doi: <a href=\"https://doi.org/10.1007/s10270-022-01002-3\">10.1007/s10270-022-01002-3</a>.","chicago":"Holtmann, Jörg, Julien Deantoni, and Markus Fockel. “Early Timing Analysis Based on Scenario Requirements and Platform Models.” <i>Software and Systems Modeling</i>, 2022. <a href=\"https://doi.org/10.1007/s10270-022-01002-3\">https://doi.org/10.1007/s10270-022-01002-3</a>.","ama":"Holtmann J, Deantoni J, Fockel M. Early timing analysis based on scenario requirements and platform models. <i>Software and Systems Modeling</i>. Published online 2022. doi:<a href=\"https://doi.org/10.1007/s10270-022-01002-3\">10.1007/s10270-022-01002-3</a>","mla":"Holtmann, Jörg, et al. “Early Timing Analysis Based on Scenario Requirements and Platform Models.” <i>Software and Systems Modeling</i>, Springer Science and Business Media LLC, 2022, doi:<a href=\"https://doi.org/10.1007/s10270-022-01002-3\">10.1007/s10270-022-01002-3</a>.","short":"J. Holtmann, J. Deantoni, M. Fockel, Software and Systems Modeling (2022).","bibtex":"@article{Holtmann_Deantoni_Fockel_2022, title={Early timing analysis based on scenario requirements and platform models}, DOI={<a href=\"https://doi.org/10.1007/s10270-022-01002-3\">10.1007/s10270-022-01002-3</a>}, journal={Software and Systems Modeling}, publisher={Springer Science and Business Media LLC}, author={Holtmann, Jörg and Deantoni, Julien and Fockel, Markus}, year={2022} }","apa":"Holtmann, J., Deantoni, J., &#38; Fockel, M. (2022). Early timing analysis based on scenario requirements and platform models. <i>Software and Systems Modeling</i>. <a href=\"https://doi.org/10.1007/s10270-022-01002-3\">https://doi.org/10.1007/s10270-022-01002-3</a>"},"publisher":"Springer Science and Business Media LLC","date_updated":"2022-05-05T14:09:41Z","date_created":"2022-05-05T14:05:32Z","author":[{"first_name":"Jörg","full_name":"Holtmann, Jörg","id":"3875","last_name":"Holtmann","orcid":"0000-0001-6141-4571"},{"full_name":"Deantoni, Julien","last_name":"Deantoni","first_name":"Julien"},{"first_name":"Markus","orcid":"0000-0002-1269-0702","last_name":"Fockel","id":"8472","full_name":"Fockel, Markus"}],"title":"Early timing analysis based on scenario requirements and platform models","doi":"10.1007/s10270-022-01002-3","type":"journal_article","publication":"Software and Systems Modeling","abstract":[{"text":"Distributed, software-intensive systems (e.g., in the automotive sector) must fulfill communication requirements under hard real-time constraints.  The requirements have to be documented and validated carefully using a systematic requirements engineering (RE) approach, for example, by applying scenario-based requirements notations. The resources of the execution platforms and their properties (e.g., CPU frequency or bus throughput) induce effects on the timing behavior, which may lead to violations of the real-time requirements. Nowadays, the platform properties and their induced timing effects are verified against the real-time requirements by means of timing analysis techniques mostly implemented in commercial-off-the-shelf tools. However, such timing analyses are conducted in late development phases since they rely on artifacts produced during these phases (e.g., the platform-specific code). In order to enable early timing analyses already during RE, we extend a scenario-based requirements notation with allocation means to platform models and define operational semantics for the purpose of simulation-based, platform-aware timing analyses. We illustrate and evaluate the approach with an automotive software-intensive system.","lang":"eng"}],"status":"public","_id":"31071","user_id":"8472","department":[{"_id":"241"},{"_id":"662"}],"keyword":["Modeling and Simulation","Software"],"language":[{"iso":"eng"}]},{"title":"Designing and Integrating IEC 62443 Compliant Threat Analysis","conference":{"location":"Edinburgh, UK","name":"European System, Software & Service Process Improvement & Innovation Conference (EuroSPI 2019)"},"doi":"10.1007/978-3-030-28005-5_5","date_updated":"2022-01-06T06:55:41Z","volume":1060,"date_created":"2021-07-23T14:09:56Z","author":[{"last_name":"Fockel","orcid":"0000-0002-1269-0702","id":"8472","full_name":"Fockel, Markus","first_name":"Markus"},{"last_name":"Merschjohann","id":"11394","full_name":"Merschjohann, Sven","first_name":"Sven"},{"first_name":"Masud","full_name":"Fazal-Baqaie, Masud","last_name":"Fazal-Baqaie"},{"first_name":"Torsten","full_name":"Förder, Torsten","last_name":"Förder"},{"last_name":"Hausmann","full_name":"Hausmann, Stefan","first_name":"Stefan"},{"last_name":"Waldeck","full_name":"Waldeck, Boris","first_name":"Boris"}],"year":"2019","intvolume":"      1060","citation":{"apa":"Fockel, M., Merschjohann, S., Fazal-Baqaie, M., Förder, T., Hausmann, S., &#38; Waldeck, B. (2019). Designing and Integrating IEC 62443 Compliant Threat Analysis. In <i>European System, Software &#38; Service Process Improvement &#38; Innovation Conference (EuroSPI 2019)</i> (Vol. 1060). Edinburgh, UK. <a href=\"https://doi.org/10.1007/978-3-030-28005-5_5\">https://doi.org/10.1007/978-3-030-28005-5_5</a>","bibtex":"@inproceedings{Fockel_Merschjohann_Fazal-Baqaie_Förder_Hausmann_Waldeck_2019, series={Communications in Computer and Information Science}, title={Designing and Integrating IEC 62443 Compliant Threat Analysis}, volume={1060}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-28005-5_5\">10.1007/978-3-030-28005-5_5</a>}, booktitle={European System, Software &#38; Service Process Improvement &#38; Innovation Conference (EuroSPI 2019)}, author={Fockel, Markus and Merschjohann, Sven and Fazal-Baqaie, Masud and Förder, Torsten and Hausmann, Stefan and Waldeck, Boris}, year={2019}, collection={Communications in Computer and Information Science} }","mla":"Fockel, Markus, et al. “Designing and Integrating IEC 62443 Compliant Threat Analysis.” <i>European System, Software &#38; Service Process Improvement &#38; Innovation Conference (EuroSPI 2019)</i>, vol. 1060, 2019, doi:<a href=\"https://doi.org/10.1007/978-3-030-28005-5_5\">10.1007/978-3-030-28005-5_5</a>.","short":"M. Fockel, S. Merschjohann, M. Fazal-Baqaie, T. Förder, S. Hausmann, B. Waldeck, in: European System, Software &#38; Service Process Improvement &#38; Innovation Conference (EuroSPI 2019), 2019.","ieee":"M. Fockel, S. Merschjohann, M. Fazal-Baqaie, T. Förder, S. Hausmann, and B. Waldeck, “Designing and Integrating IEC 62443 Compliant Threat Analysis,” in <i>European System, Software &#38; Service Process Improvement &#38; Innovation Conference (EuroSPI 2019)</i>, Edinburgh, UK, 2019, vol. 1060.","chicago":"Fockel, Markus, Sven Merschjohann, Masud Fazal-Baqaie, Torsten Förder, Stefan Hausmann, and Boris Waldeck. “Designing and Integrating IEC 62443 Compliant Threat Analysis.” In <i>European System, Software &#38; Service Process Improvement &#38; Innovation Conference (EuroSPI 2019)</i>, Vol. 1060. Communications in Computer and Information Science, 2019. <a href=\"https://doi.org/10.1007/978-3-030-28005-5_5\">https://doi.org/10.1007/978-3-030-28005-5_5</a>.","ama":"Fockel M, Merschjohann S, Fazal-Baqaie M, Förder T, Hausmann S, Waldeck B. Designing and Integrating IEC 62443 Compliant Threat Analysis. In: <i>European System, Software &#38; Service Process Improvement &#38; Innovation Conference (EuroSPI 2019)</i>. Vol 1060. Communications in Computer and Information Science. ; 2019. doi:<a href=\"https://doi.org/10.1007/978-3-030-28005-5_5\">10.1007/978-3-030-28005-5_5</a>"},"publication_identifier":{"issn":["1865-0929","1865-0937"]},"publication_status":"published","language":[{"iso":"eng"}],"_id":"22805","department":[{"_id":"241"},{"_id":"662"}],"user_id":"8472","series_title":"Communications in Computer and Information Science","status":"public","publication":"European System, Software & Service Process Improvement & Innovation Conference (EuroSPI 2019)","type":"conference"},{"abstract":[{"lang":"eng","text":"Der hohe Grad an Innovation in mechatronischen Systemen führt zu sogenannten Cyber-Physical Systems (CPS). Diese haben eine komplexe Funktionalität und Kommunikation. Wie sicherheitskritisch solche Systeme sind, wird durch sogenannte Sicherheits-Integritätslevel (SIL) kategorisiert, die durch Normen wie der ISO 26262 definiert werden. Ein bestimmter SIL beschreibt nicht nur die Höhe des Gefährdungsrisikos, sondern diktiert auch den erforderlichen Grad an Sorgfalt bei der Entwicklung des Systems. Ein hoher SIL erfordert die Anwendung von Safety-Maßnahmen mit einem hohen Sorgfaltsgrad in allen Phasen der Entwicklung und impliziert daher einen hohen Safety-Aufwand. SIL-Tailoring ist ein Mittel um den Safety-Aufwand zu reduzieren, indem man Subsystemen geringere SILs zuordnet, falls sie von kritischeren Subsystemen getrennt sind oder redundante Safety-Anforderungen erfüllen. Um den nötigen Safety-Aufwand zu planen, sollten Möglichkeiten für SIL-Tailoring so früh wie möglich identifiziert werden - d.h. bereits in der Anforderungsanalyse. Durch die Komplexität von CPS, ist es schwierig valide SIL-Tailorings zu finden. Die Validität von SIL-Tailorings muss durch Analyse von Fehlerpropagierungspfaden geprüft und durch Argumente im Safety Case begründet werden. Der Beitrag dieser Dissertation ist ein systematischer, tool-unterstützter SIL-Tailoring-Prozess, der im Safety Requirements Engineering angewendet wird. Der Prozess nutzt eine modell-basierte, formale Anforderungsspezifikation und stellt einen Katalog von Anforderungsmustern bereit. Basierend auf diesen Anforderungen werden Fehlerpropagierungsmodelle generiert und Subsystemen automatisch SILs zugeordnet. Das minimiert den Sicherheitsanalyseaufwand. Aus den generierten Ergebnissen wird automatisch ein Safety Case mit Argumenten für die SIL-Tailoring-Validität abgeleitet."}],"status":"public","type":"dissertation","language":[{"iso":"eng"}],"_id":"20779","user_id":"5786","department":[{"_id":"76"},{"_id":"241"},{"_id":"662"}],"year":"2018","citation":{"apa":"Fockel, M. (2018). <i>Safety Requirements Engineering for Early SIL Tailoring</i>. Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn. <a href=\"https://doi.org/10.17619/UNIPB/1-490\">https://doi.org/10.17619/UNIPB/1-490</a>","bibtex":"@book{Fockel_2018, title={Safety Requirements Engineering for Early SIL Tailoring}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-490\">10.17619/UNIPB/1-490</a>}, publisher={Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn}, author={Fockel, Markus}, year={2018} }","mla":"Fockel, Markus. <i>Safety Requirements Engineering for Early SIL Tailoring</i>. Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn, 2018, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-490\">10.17619/UNIPB/1-490</a>.","short":"M. Fockel, Safety Requirements Engineering for Early SIL Tailoring, Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn, 2018.","ama":"Fockel M. <i>Safety Requirements Engineering for Early SIL Tailoring</i>. Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn; 2018. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-490\">10.17619/UNIPB/1-490</a>","chicago":"Fockel, Markus. <i>Safety Requirements Engineering for Early SIL Tailoring</i>. Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn, 2018. <a href=\"https://doi.org/10.17619/UNIPB/1-490\">https://doi.org/10.17619/UNIPB/1-490</a>.","ieee":"M. Fockel, <i>Safety Requirements Engineering for Early SIL Tailoring</i>. Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn, 2018."},"title":"Safety Requirements Engineering for Early SIL Tailoring","doi":"10.17619/UNIPB/1-490","publisher":"Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn","date_updated":"2022-01-06T06:54:38Z","supervisor":[{"last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","id":"59256","first_name":"Eric"}],"author":[{"orcid":"0000-0002-1269-0702","last_name":"Fockel","id":"8472","full_name":"Fockel, Markus","first_name":"Markus"}],"date_created":"2020-12-17T11:59:05Z"},{"date_created":"2020-12-17T12:00:45Z","author":[{"first_name":"Markus","orcid":"0000-0002-1269-0702","last_name":"Fockel","full_name":"Fockel, Markus","id":"8472"},{"first_name":"Sven","full_name":"Merschjohann, Sven","id":"11394","last_name":"Merschjohann"},{"last_name":"Fazal-Baqaie","full_name":"Fazal-Baqaie, Masud","first_name":"Masud"}],"publisher":"Springer Nature Switzerland AG","date_updated":"2022-01-06T06:54:38Z","doi":"10.1007/978-3-030-03673-7_25","title":"Threat Analysis in Practice - Systematically Deriving Security Requirements","citation":{"apa":"Fockel, M., Merschjohann, S., &#38; Fazal-Baqaie, M. (2018). Threat Analysis in Practice - Systematically Deriving Security Requirements. In <i>19th International Conference on Product-Focused Software Process Improvement (PROFES 2018)</i>. Springer Nature Switzerland AG. <a href=\"https://doi.org/10.1007/978-3-030-03673-7_25\">https://doi.org/10.1007/978-3-030-03673-7_25</a>","mla":"Fockel, Markus, et al. “Threat Analysis in Practice - Systematically Deriving Security Requirements.” <i>19th International Conference on Product-Focused Software Process Improvement (PROFES 2018)</i>, Springer Nature Switzerland AG, 2018, doi:<a href=\"https://doi.org/10.1007/978-3-030-03673-7_25\">10.1007/978-3-030-03673-7_25</a>.","bibtex":"@inproceedings{Fockel_Merschjohann_Fazal-Baqaie_2018, series={LNCS 11271}, title={Threat Analysis in Practice - Systematically Deriving Security Requirements}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-03673-7_25\">10.1007/978-3-030-03673-7_25</a>}, booktitle={19th International Conference on Product-Focused Software Process Improvement (PROFES 2018)}, publisher={Springer Nature Switzerland AG}, author={Fockel, Markus and Merschjohann, Sven and Fazal-Baqaie, Masud}, year={2018}, collection={LNCS 11271} }","short":"M. Fockel, S. Merschjohann, M. Fazal-Baqaie, in: 19th International Conference on Product-Focused Software Process Improvement (PROFES 2018), Springer Nature Switzerland AG, 2018.","ama":"Fockel M, Merschjohann S, Fazal-Baqaie M. Threat Analysis in Practice - Systematically Deriving Security Requirements. In: <i>19th International Conference on Product-Focused Software Process Improvement (PROFES 2018)</i>. LNCS 11271. Springer Nature Switzerland AG; 2018. doi:<a href=\"https://doi.org/10.1007/978-3-030-03673-7_25\">10.1007/978-3-030-03673-7_25</a>","ieee":"M. Fockel, S. Merschjohann, and M. Fazal-Baqaie, “Threat Analysis in Practice - Systematically Deriving Security Requirements,” in <i>19th International Conference on Product-Focused Software Process Improvement (PROFES 2018)</i>, 2018.","chicago":"Fockel, Markus, Sven Merschjohann, and Masud Fazal-Baqaie. “Threat Analysis in Practice - Systematically Deriving Security Requirements.” In <i>19th International Conference on Product-Focused Software Process Improvement (PROFES 2018)</i>. LNCS 11271. Springer Nature Switzerland AG, 2018. <a href=\"https://doi.org/10.1007/978-3-030-03673-7_25\">https://doi.org/10.1007/978-3-030-03673-7_25</a>."},"year":"2018","department":[{"_id":"241"},{"_id":"662"}],"user_id":"8472","series_title":"LNCS 11271","_id":"20780","language":[{"iso":"eng"}],"publication":"19th International Conference on Product-Focused Software Process Improvement (PROFES 2018)","type":"conference","status":"public","abstract":[{"text":"With the growing number of incidents, the topic security gains more and more attention across all domains. Organizations realize their lack of state-of-the-art security practices, however, they struggle to improve their software lifecycle in terms of security. In this talk, we introduce the concept of security by design that implements security practices within the whole software lifecycle. Based on our practical experience from industry projects in the regulated industrial automation and unregulated classical IT domain, we explain how to perform a threat analysis and how to integrate it into the software lifecycle.","lang":"eng"}]},{"user_id":"8472","department":[{"_id":"241"},{"_id":"662"}],"_id":"20786","language":[{"iso":"eng"}],"type":"conference","publication":"6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018)","status":"public","abstract":[{"lang":"eng","text":"Distributed, software-intensive systems such as automotive electronic control units have to handle various situations employing message-based coordination. The growing complexity of such systems results in an increasing difficulty to achieve a high quality of the systems' requirements specifications. Scenario-based requirements engineering addresses the message-based coordination of such systems and enables, if underpinned with formal modeling languages, automatic analyses for ensuring the quality of requirements specifications. However, formal requirements modeling languages require high expertise of the requirements engineers and many manual iterations until specifications reach high quality. Patterns provide a constructive means for assembling high-quality solutions by applying reusable and established building blocks. Thus, they also gained momentum in requirements documentation. In order to support the requirements engineers in the systematic conception of formal, scenario-based requirements specification models, we hence introduce in this paper a requirement pattern catalog for a requirements modeling language. We illustrate and discuss the application of the requirement patterns with an example of requirements for an automotive electronic control unit."}],"author":[{"last_name":"Fockel","orcid":"0000-0002-1269-0702","id":"8472","full_name":"Fockel, Markus","first_name":"Markus"},{"first_name":"Jörg","last_name":"Holtmann","orcid":"0000-0001-6141-4571","full_name":"Holtmann, Jörg","id":"3875"},{"first_name":"Thorsten","last_name":"Koch","full_name":"Koch, Thorsten","id":"13616"},{"first_name":"David","id":"40982","full_name":"Schmelter, David","last_name":"Schmelter","orcid":"0000-0001-7787-5380"}],"date_created":"2020-12-17T12:12:20Z","date_updated":"2022-01-06T06:54:38Z","title":"Formal, Model- and Scenario-based Requirement Patterns","citation":{"ama":"Fockel M, Holtmann J, Koch T, Schmelter D. Formal, Model- and Scenario-based Requirement Patterns. In: <i>6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018)</i>. ; 2018.","ieee":"M. Fockel, J. Holtmann, T. Koch, and D. Schmelter, “Formal, Model- and Scenario-based Requirement Patterns,” in <i>6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018)</i>, 2018.","chicago":"Fockel, Markus, Jörg Holtmann, Thorsten Koch, and David Schmelter. “Formal, Model- and Scenario-Based Requirement Patterns.” In <i>6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018)</i>, 2018.","mla":"Fockel, Markus, et al. “Formal, Model- and Scenario-Based Requirement Patterns.” <i>6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018)</i>, 2018.","short":"M. Fockel, J. Holtmann, T. Koch, D. Schmelter, in: 6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018), 2018.","bibtex":"@inproceedings{Fockel_Holtmann_Koch_Schmelter_2018, title={Formal, Model- and Scenario-based Requirement Patterns}, booktitle={6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018)}, author={Fockel, Markus and Holtmann, Jörg and Koch, Thorsten and Schmelter, David}, year={2018} }","apa":"Fockel, M., Holtmann, J., Koch, T., &#38; Schmelter, D. (2018). Formal, Model- and Scenario-based Requirement Patterns. In <i>6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018)</i>."},"year":"2018"},{"publication":" Tag des Systems Engineering 2017","type":"conference","status":"public","abstract":[{"lang":"eng","text":"Intelligente technische Systeme, wie autonom fahrende Fahrzeuge, werden in einem hohen Maß durch Software realisiert. Der Weg zum autonomen Fahren führt unweigerlich über eine steigende Vernetzung von Steuergeräten im Fahrzeug und über Fahrzeuggrenzen hinweg. Damit einher geht eine stetig steigende Komplexität der Software. Deshalb liegt es auf der Hand, dass die systematische Qualitätssicherung für derartige technische Systeme sehr früh, also bereits entwicklungsbegleitend, erfolgen muss. Dazu lässt sich das Software-in-the-Loop-Verfahren einsetzen, das auf etablierte Techniken des Hardware-in-the-Loop-Verfahrens zurückgreift. Eine besondere Herausforderung besteht darin, Simulationsmodelle und Testbibliotheken sowie die zugehörigen Visualisierungs- und Testwerkzeuge in beiden Welten synergetisch zu nutzen. Das Ziel ist eine einheitliche X-in-the-Loop (XIL) Basis für beide Verfahren. Der Schlüssel zu einer einheitlichen Basis für durchgängige XIL-Testszenarien ist der Einsatz eines übergeordneten Systemmodells. Es definiert die Systemgrenze und umliegenden Systeme in der Umwelt. Zudem dient das Systemmodell als Ordnungsschema für die Ablage der Artefakte wie Verhaltensmodelle, Testskripte, Parametersätze oder Workflows. Ein zentrales Datenmanagementwerkzeug, welches sämtliche Strukturinformationen, Verhaltensmodelle und Variantenbezüge verknüpft, ermöglicht ein teilautomatisches Umschalten zwischen den Testszenarien. In diesem Beitrag stellen wir eine solche Lösung vor."}],"department":[{"_id":"241"},{"_id":"662"}],"user_id":"8472","_id":"20791","language":[{"iso":"eng"}],"citation":{"ama":"Schmitz J, Fockel M. Systemmodelle als Schlüssel zu durchgängigen XIL-Testszenarien. In: <i> Tag Des Systems Engineering 2017</i>. Gesellschaft f{\\\"u}r Systems Engineering e.V.; 2017.","ieee":"J. Schmitz and M. Fockel, “Systemmodelle als Schlüssel zu durchgängigen XIL-Testszenarien,” in <i> Tag des Systems Engineering 2017</i>, 2017.","chicago":"Schmitz, Joachim, and Markus Fockel. “Systemmodelle Als Schlüssel Zu Durchgängigen XIL-Testszenarien.” In <i> Tag Des Systems Engineering 2017</i>. Gesellschaft f{\\\"u}r Systems Engineering e.V., 2017.","apa":"Schmitz, J., &#38; Fockel, M. (2017). Systemmodelle als Schlüssel zu durchgängigen XIL-Testszenarien. In <i> Tag des Systems Engineering 2017</i>. Gesellschaft f{\\\"u}r Systems Engineering e.V.","bibtex":"@inproceedings{Schmitz_Fockel_2017, title={Systemmodelle als Schlüssel zu durchgängigen XIL-Testszenarien}, booktitle={ Tag des Systems Engineering 2017}, publisher={Gesellschaft f{\\\"u}r Systems Engineering e.V.}, author={Schmitz, Joachim and Fockel, Markus}, year={2017} }","mla":"Schmitz, Joachim, and Markus Fockel. “Systemmodelle Als Schlüssel Zu Durchgängigen XIL-Testszenarien.” <i> Tag Des Systems Engineering 2017</i>, Gesellschaft f{\\\"u}r Systems Engineering e.V., 2017.","short":"J. Schmitz, M. Fockel, in:  Tag Des Systems Engineering 2017, Gesellschaft f{\\\"u}r Systems Engineering e.V., 2017."},"year":"2017","date_created":"2020-12-17T13:29:01Z","author":[{"first_name":"Joachim","full_name":"Schmitz, Joachim","last_name":"Schmitz"},{"full_name":"Fockel, Markus","id":"8472","last_name":"Fockel","orcid":"0000-0002-1269-0702","first_name":"Markus"}],"date_updated":"2022-01-06T06:54:38Z","publisher":"Gesellschaft f{\\\"u}r Systems Engineering e.V.","title":"Systemmodelle als Schlüssel zu durchgängigen XIL-Testszenarien"},{"abstract":[{"text":"Scenario-based requirements engineering addresses the message-based coordination of software-intensive systems and enables, if underpinned with formal languages, automatic requirements validation techniques for improving the quality of a requirements specification. One of such requirements engineering approaches bases on a recent visual Live Sequence Chart variant compliant to the Unified Modeling Language, so-called Modal Sequence Diagrams (MSDs). The usage of patterns is known to be constructive thanks to assembling solutions by means of reusable building blocks that are proven in practice, so that recurring problems do not need to be solved over and over again. Thus, patterns also gained momentum in the area of requirements documentation. In this technical report, we introduce a model- and scenario-based pattern catalog for MSD requirements. Our MSD requirement pattern catalog consolidates and unifies 86 requirement patterns from three well-known, practice-oriented requirement pattern catalogs, each covering different aspects.","lang":"eng"}],"status":"public","type":"report","report_number":"tr-ri-17-354","language":[{"iso":"eng"}],"_id":"20793","department":[{"_id":"241"},{"_id":"662"}],"user_id":"8472","place":"Paderborn, Germany","year":"2017","citation":{"apa":"Fockel, M., Holtmann, J., Koch, T., &#38; Schmelter, D. (2017). <i>Model-based Requirement Pattern Catalog</i>. Paderborn, Germany.","short":"M. Fockel, J. Holtmann, T. Koch, D. Schmelter, Model-Based Requirement Pattern Catalog, Paderborn, Germany, 2017.","bibtex":"@book{Fockel_Holtmann_Koch_Schmelter_2017, place={Paderborn, Germany}, title={Model-based Requirement Pattern Catalog}, author={Fockel, Markus and Holtmann, Jörg and Koch, Thorsten and Schmelter, David}, year={2017} }","mla":"Fockel, Markus, et al. <i>Model-Based Requirement Pattern Catalog</i>. 2017.","chicago":"Fockel, Markus, Jörg Holtmann, Thorsten Koch, and David Schmelter. <i>Model-Based Requirement Pattern Catalog</i>. Paderborn, Germany, 2017.","ieee":"M. Fockel, J. Holtmann, T. Koch, and D. Schmelter, <i>Model-based Requirement Pattern Catalog</i>. Paderborn, Germany, 2017.","ama":"Fockel M, Holtmann J, Koch T, Schmelter D. <i>Model-Based Requirement Pattern Catalog</i>. Paderborn, Germany; 2017."},"title":"Model-based Requirement Pattern Catalog","date_updated":"2022-01-06T06:54:38Z","author":[{"full_name":"Fockel, Markus","id":"8472","orcid":"0000-0002-1269-0702","last_name":"Fockel","first_name":"Markus"},{"first_name":"Jörg","full_name":"Holtmann, Jörg","id":"3875","orcid":"0000-0001-6141-4571","last_name":"Holtmann"},{"first_name":"Thorsten","last_name":"Koch","id":"13616","full_name":"Koch, Thorsten"},{"full_name":"Schmelter, David","id":"40982","orcid":"0000-0001-7787-5380","last_name":"Schmelter","first_name":"David"}],"date_created":"2020-12-17T13:31:36Z"},{"year":"2016","citation":{"apa":"Holtmann, J., Fockel, M., Koch, T., Schmelter, D., Brenner, C., Bernijazov, R., &#38; Sander, M. (2016). <i>The MechatronicUML Requirements Engineering Method: Process and Language</i>. <a href=\"https://doi.org/10.13140/RG.2.2.33223.29606\">https://doi.org/10.13140/RG.2.2.33223.29606</a>","bibtex":"@book{Holtmann_Fockel_Koch_Schmelter_Brenner_Bernijazov_Sander_2016, title={The MechatronicUML Requirements Engineering Method: Process and Language}, DOI={<a href=\"https://doi.org/10.13140/RG.2.2.33223.29606\">10.13140/RG.2.2.33223.29606</a>}, author={Holtmann, Jörg and Fockel, Markus and Koch, Thorsten and Schmelter, David and Brenner, Christian and Bernijazov, Ruslan and Sander, Marcel}, year={2016} }","mla":"Holtmann, Jörg, et al. <i>The MechatronicUML Requirements Engineering Method: Process and Language</i>. 2016, doi:<a href=\"https://doi.org/10.13140/RG.2.2.33223.29606\">10.13140/RG.2.2.33223.29606</a>.","short":"J. Holtmann, M. Fockel, T. Koch, D. Schmelter, C. Brenner, R. Bernijazov, M. Sander, The MechatronicUML Requirements Engineering Method: Process and Language, 2016.","chicago":"Holtmann, Jörg, Markus Fockel, Thorsten Koch, David Schmelter, Christian Brenner, Ruslan Bernijazov, and Marcel Sander. <i>The MechatronicUML Requirements Engineering Method: Process and Language</i>, 2016. <a href=\"https://doi.org/10.13140/RG.2.2.33223.29606\">https://doi.org/10.13140/RG.2.2.33223.29606</a>.","ieee":"J. Holtmann <i>et al.</i>, <i>The MechatronicUML Requirements Engineering Method: Process and Language</i>. 2016.","ama":"Holtmann J, Fockel M, Koch T, et al. <i>The MechatronicUML Requirements Engineering Method: Process and Language</i>.; 2016. doi:<a href=\"https://doi.org/10.13140/RG.2.2.33223.29606\">10.13140/RG.2.2.33223.29606</a>"},"title":"The MechatronicUML Requirements Engineering Method: Process and Language","doi":"10.13140/RG.2.2.33223.29606","date_updated":"2022-01-06T06:54:40Z","date_created":"2020-12-22T09:28:23Z","author":[{"first_name":"Jörg","orcid":"0000-0001-6141-4571","last_name":"Holtmann","id":"3875","full_name":"Holtmann, Jörg"},{"first_name":"Markus","id":"8472","full_name":"Fockel, Markus","orcid":"0000-0002-1269-0702","last_name":"Fockel"},{"first_name":"Thorsten","full_name":"Koch, Thorsten","id":"13616","last_name":"Koch"},{"id":"40982","full_name":"Schmelter, David","orcid":"0000-0001-7787-5380","last_name":"Schmelter","first_name":"David"},{"last_name":"Brenner","full_name":"Brenner, Christian","first_name":"Christian"},{"first_name":"Ruslan","last_name":"Bernijazov","full_name":"Bernijazov, Ruslan"},{"first_name":"Marcel","full_name":"Sander, Marcel","last_name":"Sander"}],"abstract":[{"lang":"eng","text":"In this technical report, we present the MechatronicUML requirements engineering method. The method encompasses a process and a scenario-based modeling language for the documentation and analysis of requirements on the message-based interaction behavior of software-intensive systems. The modeling language uses a scenario notation based on Modal Sequence Diagrams (MSDs), which borrows concepts of UML Interactions as well as of Live Sequence Charts. Furthermore, we introduce the so-called Emergency Braking & Evasion System (EBEAS) as a running example, which is based on current and upcoming real-world driver assistance systems. "}],"status":"public","type":"report","language":[{"iso":"eng"}],"_id":"20823","user_id":"5786","department":[{"_id":"76"},{"_id":"241"},{"_id":"662"}]},{"volume":9923,"date_created":"2020-12-22T09:35:16Z","author":[{"full_name":"Fockel, Markus","id":"8472","last_name":"Fockel","orcid":"0000-0002-1269-0702","first_name":"Markus"}],"publisher":"Springer International Publishing Switzerland","date_updated":"2022-01-06T06:54:40Z","title":"ASIL Tailoring on Functional Safety Requirements","page":"298–310","intvolume":"      9923","citation":{"ama":"Fockel M. ASIL Tailoring on Functional Safety Requirements. In: <i>5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR)</i>. Vol 9923. Lecture Notes in Computer Science (LNCS). Trondheim, Norway: Springer International Publishing Switzerland; 2016:298–310.","ieee":"M. Fockel, “ASIL Tailoring on Functional Safety Requirements,” in <i>5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR)</i>, 2016, vol. 9923, pp. 298–310.","chicago":"Fockel, Markus. “ASIL Tailoring on Functional Safety Requirements.” In <i>5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR)</i>, 9923:298–310. Lecture Notes in Computer Science (LNCS). Trondheim, Norway: Springer International Publishing Switzerland, 2016.","bibtex":"@inproceedings{Fockel_2016, place={Trondheim, Norway}, series={Lecture Notes in Computer Science (LNCS)}, title={ASIL Tailoring on Functional Safety Requirements}, volume={9923}, booktitle={5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR)}, publisher={Springer International Publishing Switzerland}, author={Fockel, Markus}, year={2016}, pages={298–310}, collection={Lecture Notes in Computer Science (LNCS)} }","short":"M. Fockel, in: 5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR), Springer International Publishing Switzerland, Trondheim, Norway, 2016, pp. 298–310.","mla":"Fockel, Markus. “ASIL Tailoring on Functional Safety Requirements.” <i>5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR)</i>, vol. 9923, Springer International Publishing Switzerland, 2016, pp. 298–310.","apa":"Fockel, M. (2016). ASIL Tailoring on Functional Safety Requirements. In <i>5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR)</i> (Vol. 9923, pp. 298–310). Trondheim, Norway: Springer International Publishing Switzerland."},"place":"Trondheim, Norway","year":"2016","department":[{"_id":"241"},{"_id":"662"}],"series_title":"Lecture Notes in Computer Science (LNCS)","user_id":"8472","_id":"20827","language":[{"iso":"eng"}],"publication":"5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR)","type":"conference","status":"public","abstract":[{"lang":"eng","text":"Cyber-physical systems like self-driving cars are highly complex and safety-critical. This results in a great number of safety requirements that have different levels of criticality. In automotive, the criticality is categorized in Automotive Safety Integrity Levels (ASIL). As a high ASIL causes high development effort, the goal is to develop most subsystems with lower ASIL requirements. To achieve this ASIL tailoring, subsystems need to be separated or redundantly implemented. These safety measures are usually integrated late in the development process and thus cause costly development iterations. In this paper, we present a systematic, tool-supported ASIL tailoring process for the requirements analysis phase. It is applied on formal safety requirements and automatically generated fault trees for a functional view of the system. The process supports early planning of safety efforts for mixed-criticality systems and avoids costly late development iterations."}]},{"title":"Requirements Engineering - Zusatzaufgabe oder Kernkompetenz?","main_file_link":[{"url":"http://www.sigs-datacom.de/uploads/tx_dmjournals/fockel_holtmann_koch_schmelter_OTS_RE_16.pdf"}],"date_updated":"2022-01-06T06:54:40Z","author":[{"full_name":"Holtmann, Jörg","id":"3875","orcid":"0000-0001-6141-4571","last_name":"Holtmann","first_name":"Jörg"},{"first_name":"Markus","orcid":"0000-0002-1269-0702","last_name":"Fockel","id":"8472","full_name":"Fockel, Markus"},{"last_name":"Koch","full_name":"Koch, Thorsten","id":"13616","first_name":"Thorsten"},{"first_name":"David","id":"40982","full_name":"Schmelter, David","last_name":"Schmelter","orcid":"0000-0001-7787-5380"}],"date_created":"2020-12-22T09:36:49Z","year":"2016","citation":{"ama":"Holtmann J, Fockel M, Koch T, Schmelter D. Requirements Engineering - Zusatzaufgabe oder Kernkompetenz? <i>OBJEKTspektrum</i>. 2016;(RE/2016).","ieee":"J. Holtmann, M. Fockel, T. Koch, and D. Schmelter, “Requirements Engineering - Zusatzaufgabe oder Kernkompetenz?,” <i>OBJEKTspektrum</i>, no. RE/2016, 2016.","chicago":"Holtmann, Jörg, Markus Fockel, Thorsten Koch, and David Schmelter. “Requirements Engineering - Zusatzaufgabe Oder Kernkompetenz?” <i>OBJEKTspektrum</i>, no. RE/2016 (2016).","mla":"Holtmann, Jörg, et al. “Requirements Engineering - Zusatzaufgabe Oder Kernkompetenz?” <i>OBJEKTspektrum</i>, no. RE/2016, 2016.","bibtex":"@article{Holtmann_Fockel_Koch_Schmelter_2016, title={Requirements Engineering - Zusatzaufgabe oder Kernkompetenz?}, number={RE/2016}, journal={OBJEKTspektrum}, author={Holtmann, Jörg and Fockel, Markus and Koch, Thorsten and Schmelter, David}, year={2016} }","short":"J. Holtmann, M. Fockel, T. Koch, D. Schmelter, OBJEKTspektrum (2016).","apa":"Holtmann, J., Fockel, M., Koch, T., &#38; Schmelter, D. (2016). Requirements Engineering - Zusatzaufgabe oder Kernkompetenz? <i>OBJEKTspektrum</i>, (RE/2016)."},"issue":"RE/2016","language":[{"iso":"eng"}],"_id":"20828","user_id":"8472","department":[{"_id":"241"},{"_id":"662"}],"abstract":[{"text":"In verschiedenen Unternehmen wird mit Anforderungen unterschiedlich umgegangen. Je nach Größe, Branche und Unternehmenskultur ist das Thema Requirements Engineering (RE) mal weniger, mal mehr etabliert. In einigen Unternehmen wird es als lästige Zusatzaufgabe betrachtet, während andere Unternehmen ganze Abteilungen mit RE als Kernkompetenz betreiben. RE wird allerdings in jedem Projekt - bewusst oder unbewusst - durchgeführt! RE ist die Basis für den weiteren Entwicklungsprozess, die Validierung/Verifikation und die Plan- und Messbarkeit des Projekts. Darüber hinaus können Fehler, die auf Anforderungsebene gefunden werden, weniger aufwendig und somit günstiger behoben werden als in späteren Entwicklungsphasen. Am Fraunhofer IEM beraten wir Unternehmen und erforschen neue Methoden bezüglich der Entwicklung von intelligenten technischen Systemen. In diesem Artikel berichten wir über unsere Erfahrungen aus Projekten, in denen wir Unternehmen aus verschiedenen Branchen und mit unterschiedlichem RE-Reifegrad zwecks Leistungssteigerung des RE begleitet haben. Auf Basis dieser Projekterfahrungen zeigen wir Wege auf, wie der Stand des RE mittels eines Reifegradmodells im eigenen Unternehmen verbessert werden kann.","lang":"ger"}],"status":"public","type":"journal_article","publication":"OBJEKTspektrum"},{"_id":"20969","user_id":"8472","department":[{"_id":"241"},{"_id":"662"}],"language":[{"iso":"eng"}],"type":"conference","publication":"Tag des Systems Engineering 2015","abstract":[{"text":"Zukünftige mechatronische Systeme entwickeln sich mehr und mehr zu intelligenten technischen Systemen, die durch eine zunehmende Verzahnung der mechanischen, elektrischen und informationsverarbeitenden Anteile gekennzeichnet sind. Um das Zusammenspiel der Disziplinen besser zu beherrschen, werden zunehmend Methoden und disziplinübergreifende Systemmodelle des Systems Engineering genutzt. Offene Probleme sind dabei noch die Nachverfolgbarkeit der Entwicklung (Traceability) und die Verwaltung zueinander konsistenter Versionen von disziplinübergreifenden und disziplinspezifischen Modellen. Dieser Beitrag adressiert diese Probleme durch die Verknüpfung der Spezifikationstechnik CONSENS für den Systementwurf mit dem Datenmanagementwerkzeug SYNECT. Der Beitrag stellt die Konzipierung und prototypische Werkzeugunterstützung für die Verknüpfung von Systemmodellen und disziplinspezifischen MATLAB/Simulink-Modellen vor.\r\n","lang":"eng"}],"status":"public","date_updated":"2022-01-06T06:54:42Z","publisher":"Gesellschaft für Systems Engineering e.V.","date_created":"2021-01-13T13:02:44Z","author":[{"last_name":"Schmitz","full_name":"Schmitz, Joachim","first_name":"Joachim"},{"first_name":"Markus","id":"8472","full_name":"Fockel, Markus","last_name":"Fockel","orcid":"0000-0002-1269-0702"}],"title":"Vom Systemmodell zu disziplinspezifischen Modellen und zurück","year":"2015","citation":{"ama":"Schmitz J, Fockel M. Vom Systemmodell zu disziplinspezifischen Modellen und zurück. In: <i>Tag Des Systems Engineering 2015</i>. Gesellschaft für Systems Engineering e.V.; 2015.","chicago":"Schmitz, Joachim, and Markus Fockel. “Vom Systemmodell Zu Disziplinspezifischen Modellen Und Zurück.” In <i>Tag Des Systems Engineering 2015</i>. Gesellschaft für Systems Engineering e.V., 2015.","ieee":"J. Schmitz and M. Fockel, “Vom Systemmodell zu disziplinspezifischen Modellen und zurück,” in <i>Tag des Systems Engineering 2015</i>, 2015.","short":"J. Schmitz, M. Fockel, in: Tag Des Systems Engineering 2015, Gesellschaft für Systems Engineering e.V., 2015.","bibtex":"@inproceedings{Schmitz_Fockel_2015, title={Vom Systemmodell zu disziplinspezifischen Modellen und zurück}, booktitle={Tag des Systems Engineering 2015}, publisher={Gesellschaft für Systems Engineering e.V.}, author={Schmitz, Joachim and Fockel, Markus}, year={2015} }","mla":"Schmitz, Joachim, and Markus Fockel. “Vom Systemmodell Zu Disziplinspezifischen Modellen Und Zurück.” <i>Tag Des Systems Engineering 2015</i>, Gesellschaft für Systems Engineering e.V., 2015.","apa":"Schmitz, J., &#38; Fockel, M. (2015). Vom Systemmodell zu disziplinspezifischen Modellen und zurück. In <i>Tag des Systems Engineering 2015</i>. Gesellschaft für Systems Engineering e.V."}},{"department":[{"_id":"241"},{"_id":"662"}],"user_id":"8472","_id":"20970","language":[{"iso":"eng"}],"publication":"Tag des Systems Engineering 2015","type":"conference","status":"public","abstract":[{"lang":"ger","text":"Automobile Steuergeräte realisieren mehr und mehr sicherheitskritische Funktionen. Nicht erst durch die Einführung der ISO 26262 werden an die Entwicklung sicherheitskritischer Funktionen besondere Anforderungen zum Beispiel in Form von Sicherheitsanalysen gestellt. In der Praxis hat sich herausgestellt, dass durch den bisherigen Systementwurf nicht alle notwendigen Daten für die Sicherheitsanalysen vorlagen. Von daher war eine Erweiterung des bisherigen Vorgehens erforderlich, sodass die benötigten Daten zu den erforderlichen Zeitpunkten vorliegen und die Sicherheitsanalysen ohne aufwendige Nacharbeiten erstellt werden können. Dieser Artikel beschreibt die durchgeführten Erweiterungen und die Erfahrungen, die in Serienprojekten eines automobilen Zulieferers gesammelt wurden."}],"author":[{"first_name":"Jan","full_name":"Meyer, Jan","last_name":"Meyer"},{"first_name":"Markus","id":"8472","full_name":"Fockel, Markus","orcid":"0000-0002-1269-0702","last_name":"Fockel"},{"first_name":"Jörg","full_name":"Holtmann, Jörg","id":"3875","last_name":"Holtmann","orcid":"0000-0001-6141-4571"}],"date_created":"2021-01-13T13:04:04Z","publisher":"Gesellschaft für Systems Engineering e.V.","date_updated":"2022-01-06T06:54:42Z","title":"Systementwurf unter Einbeziehung funktionaler Sicherheit bei automobilen Steuergeräten","citation":{"apa":"Meyer, J., Fockel, M., &#38; Holtmann, J. (2015). Systementwurf unter Einbeziehung funktionaler Sicherheit bei automobilen Steuergeräten. In <i>Tag des Systems Engineering 2015</i>. Gesellschaft für Systems Engineering e.V.","mla":"Meyer, Jan, et al. “Systementwurf Unter Einbeziehung Funktionaler Sicherheit Bei Automobilen Steuergeräten.” <i>Tag Des Systems Engineering 2015</i>, Gesellschaft für Systems Engineering e.V., 2015.","short":"J. Meyer, M. Fockel, J. Holtmann, in: Tag Des Systems Engineering 2015, Gesellschaft für Systems Engineering e.V., 2015.","bibtex":"@inproceedings{Meyer_Fockel_Holtmann_2015, title={Systementwurf unter Einbeziehung funktionaler Sicherheit bei automobilen Steuergeräten}, booktitle={Tag des Systems Engineering 2015}, publisher={Gesellschaft für Systems Engineering e.V.}, author={Meyer, Jan and Fockel, Markus and Holtmann, Jörg}, year={2015} }","ama":"Meyer J, Fockel M, Holtmann J. Systementwurf unter Einbeziehung funktionaler Sicherheit bei automobilen Steuergeräten. In: <i>Tag Des Systems Engineering 2015</i>. Gesellschaft für Systems Engineering e.V.; 2015.","ieee":"J. Meyer, M. Fockel, and J. Holtmann, “Systementwurf unter Einbeziehung funktionaler Sicherheit bei automobilen Steuergeräten,” in <i>Tag des Systems Engineering 2015</i>, 2015.","chicago":"Meyer, Jan, Markus Fockel, and Jörg Holtmann. “Systementwurf Unter Einbeziehung Funktionaler Sicherheit Bei Automobilen Steuergeräten.” In <i>Tag Des Systems Engineering 2015</i>. Gesellschaft für Systems Engineering e.V., 2015."},"year":"2015"},{"citation":{"apa":"Fockel, M., &#38; Holtmann, J. (2015). ReqPat: Efficient Documentation of High-quality Requirements using Controlled Natural Language. In <i>Proc. of the 23rd International Requirements Engineering Conference 2015 (RE15)</i>. IEEE.","short":"M. Fockel, J. Holtmann, in: Proc. of the 23rd International Requirements Engineering Conference 2015 (RE15), IEEE, 2015.","bibtex":"@inproceedings{Fockel_Holtmann_2015, title={ReqPat: Efficient Documentation of High-quality Requirements using Controlled Natural Language}, booktitle={Proc. of the 23rd International Requirements Engineering Conference 2015 (RE15)}, publisher={IEEE}, author={Fockel, Markus and Holtmann, Jörg}, year={2015} }","mla":"Fockel, Markus, and Jörg Holtmann. “ReqPat: Efficient Documentation of High-Quality Requirements Using Controlled Natural Language.” <i>Proc. of the 23rd International Requirements Engineering Conference 2015 (RE15)</i>, IEEE, 2015.","chicago":"Fockel, Markus, and Jörg Holtmann. “ReqPat: Efficient Documentation of High-Quality Requirements Using Controlled Natural Language.” In <i>Proc. of the 23rd International Requirements Engineering Conference 2015 (RE15)</i>. IEEE, 2015.","ieee":"M. Fockel and J. Holtmann, “ReqPat: Efficient Documentation of High-quality Requirements using Controlled Natural Language,” in <i>Proc. of the 23rd International Requirements Engineering Conference 2015 (RE15)</i>, 2015.","ama":"Fockel M, Holtmann J. ReqPat: Efficient Documentation of High-quality Requirements using Controlled Natural Language. In: <i>Proc. of the 23rd International Requirements Engineering Conference 2015 (RE15)</i>. IEEE; 2015."},"year":"2015","date_created":"2021-01-13T13:05:20Z","author":[{"id":"8472","full_name":"Fockel, Markus","last_name":"Fockel","orcid":"0000-0002-1269-0702","first_name":"Markus"},{"first_name":"Jörg","orcid":"0000-0001-6141-4571","last_name":"Holtmann","full_name":"Holtmann, Jörg","id":"3875"}],"date_updated":"2022-01-06T06:54:42Z","publisher":"IEEE","title":"ReqPat: Efficient Documentation of High-quality Requirements using Controlled Natural Language","type":"conference","publication":"Proc. of the 23rd International Requirements Engineering Conference 2015 (RE15)","status":"public","abstract":[{"text":"The growing complexity of today's software intensive systems results in an increased size of requirements specifications, which are typically documented by means of natural language (NL). Large NL requirements specifications are prone to contain defects (e.g., contradictions), and the inherent ambiguity of NL impedes automatic techniques to support the requirements engineer. In order to cope with this problem, we conceived a requirements documentation approach implemented in the tool ReqPat. Using a controlled NL, it supports an efficient requirements documentation, an automatic requirements validation, and an automatic transition to models--while still keeping the requirements understandable for all stakeholders.\r\n","lang":"eng"}],"user_id":"8472","department":[{"_id":"241"},{"_id":"662"}],"_id":"20971","language":[{"iso":"eng"}]},{"date_updated":"2022-01-06T06:54:42Z","author":[{"orcid":"0000-0002-1269-0702","last_name":"Fockel","full_name":"Fockel, Markus","id":"8472","first_name":"Markus"},{"first_name":"Jörg","orcid":"0000-0001-6141-4571","last_name":"Holtmann","id":"3875","full_name":"Holtmann, Jörg"}],"date_created":"2021-01-13T13:06:57Z","title":"A requirements engineering methodology combining models and controlled natural language","doi":"10.1109/modre.2014.6890827","publication_status":"published","publication_identifier":{"isbn":["9781479963430"]},"year":"2014","citation":{"apa":"Fockel, M., &#38; Holtmann, J. (2014). A requirements engineering methodology combining models and controlled natural language. In <i>2014 IEEE 4th International Model-Driven Requirements Engineering Workshop (MoDRE)</i>. <a href=\"https://doi.org/10.1109/modre.2014.6890827\">https://doi.org/10.1109/modre.2014.6890827</a>","mla":"Fockel, Markus, and Jörg Holtmann. “A Requirements Engineering Methodology Combining Models and Controlled Natural Language.” <i>2014 IEEE 4th International Model-Driven Requirements Engineering Workshop (MoDRE)</i>, 2014, doi:<a href=\"https://doi.org/10.1109/modre.2014.6890827\">10.1109/modre.2014.6890827</a>.","bibtex":"@inproceedings{Fockel_Holtmann_2014, title={A requirements engineering methodology combining models and controlled natural language}, DOI={<a href=\"https://doi.org/10.1109/modre.2014.6890827\">10.1109/modre.2014.6890827</a>}, booktitle={2014 IEEE 4th International Model-Driven Requirements Engineering Workshop (MoDRE)}, author={Fockel, Markus and Holtmann, Jörg}, year={2014} }","short":"M. Fockel, J. Holtmann, in: 2014 IEEE 4th International Model-Driven Requirements Engineering Workshop (MoDRE), 2014.","ama":"Fockel M, Holtmann J. A requirements engineering methodology combining models and controlled natural language. In: <i>2014 IEEE 4th International Model-Driven Requirements Engineering Workshop (MoDRE)</i>. ; 2014. doi:<a href=\"https://doi.org/10.1109/modre.2014.6890827\">10.1109/modre.2014.6890827</a>","chicago":"Fockel, Markus, and Jörg Holtmann. “A Requirements Engineering Methodology Combining Models and Controlled Natural Language.” In <i>2014 IEEE 4th International Model-Driven Requirements Engineering Workshop (MoDRE)</i>, 2014. <a href=\"https://doi.org/10.1109/modre.2014.6890827\">https://doi.org/10.1109/modre.2014.6890827</a>.","ieee":"M. Fockel and J. Holtmann, “A requirements engineering methodology combining models and controlled natural language,” in <i>2014 IEEE 4th International Model-Driven Requirements Engineering Workshop (MoDRE)</i>, 2014."},"_id":"20972","user_id":"8472","department":[{"_id":"241"},{"_id":"662"}],"language":[{"iso":"eng"}],"type":"conference","publication":"2014 IEEE 4th International Model-Driven Requirements Engineering Workshop (MoDRE)","abstract":[{"text":"The use of models in requirements engineering (RE) for software-intensive embedded systems is considered beneficial. The main advantages of requirements models as documentation format are that they facilitate requirements understanding and foster automatic analysis techniques. However, natural language (NL) is still the dominant documentation format for requirements specifications, particularly in the domain of embedded systems. This is due to the facts that NL-based requirements can be used within legally binding documents and are more appropriate for reviews than models. In order to bridge the gap between both of these documentation formats, this paper proposes a model-driven RE methodology that makes use of requirements models along with a controlled natural language. The methodology combines the advantages of model-based and NL-based documentation by means of a bidirectional multi-step model transformation between both documentation formats. We illustrate the approach by means of an automotive example, explain the particular steps of the model transformation, and present performance results.\r\n","lang":"eng"}],"status":"public"},{"language":[{"iso":"eng"}],"_id":"20906","user_id":"8472","department":[{"_id":"241"},{"_id":"662"}],"abstract":[{"text":"Von heutigen technischen Systemen wird immer mehr Funktionalität gefordert. Dies manifestiert sich in einer steigenden Anzahl von Anforderungen, die üblicherweise in freier natürlicher Sprache festgehalten werden. Das führt oft zu mehrdeutigen, widersprüchlichen oder unvollständigen Anforderungen. In diesem Beitrag wird eine Methode zur Spezifikation von Anforderungen auf Basis von Satzmustern inklusive ihrer Werkzeugunterstützung „ReqPat“ vorgestellt: Anforderungen werden weiterhin textuell aber in einer eingeschränkten natürlichen Sprache verfasst. Dadurch wird ein einheitliches Anforderungsverständnis erreicht und es werden Qualitätsanalysen sowie der Übergang zu Modellen automatisiert.","lang":"ger"}],"status":"public","type":"journal_article","publication":"OBJEKTspektrum","title":"Mit Satzmustern hochwertige Anforderungsdokumente effizient erstellen","date_updated":"2022-01-06T06:54:41Z","author":[{"first_name":"Markus","last_name":"Fockel","orcid":"0000-0002-1269-0702","full_name":"Fockel, Markus","id":"8472"},{"first_name":"Jörg","id":"3875","full_name":"Holtmann, Jörg","last_name":"Holtmann","orcid":"0000-0001-6141-4571"},{"first_name":"Matthias","full_name":"Meyer, Matthias","id":"683","last_name":"Meyer"}],"date_created":"2021-01-12T14:05:27Z","year":"2014","citation":{"chicago":"Fockel, Markus, Jörg Holtmann, and Matthias Meyer. “Mit Satzmustern Hochwertige Anforderungsdokumente Effizient Erstellen.” <i>OBJEKTspektrum</i>, no. RE/2014 (2014).","ieee":"M. Fockel, J. Holtmann, and M. Meyer, “Mit Satzmustern hochwertige Anforderungsdokumente effizient erstellen,” <i>OBJEKTspektrum</i>, no. RE/2014, 2014.","ama":"Fockel M, Holtmann J, Meyer M. Mit Satzmustern hochwertige Anforderungsdokumente effizient erstellen. <i>OBJEKTspektrum</i>. 2014;(RE/2014).","mla":"Fockel, Markus, et al. “Mit Satzmustern Hochwertige Anforderungsdokumente Effizient Erstellen.” <i>OBJEKTspektrum</i>, no. RE/2014, 2014.","short":"M. Fockel, J. Holtmann, M. Meyer, OBJEKTspektrum (2014).","bibtex":"@article{Fockel_Holtmann_Meyer_2014, title={Mit Satzmustern hochwertige Anforderungsdokumente effizient erstellen}, number={RE/2014}, journal={OBJEKTspektrum}, author={Fockel, Markus and Holtmann, Jörg and Meyer, Matthias}, year={2014} }","apa":"Fockel, M., Holtmann, J., &#38; Meyer, M. (2014). Mit Satzmustern hochwertige Anforderungsdokumente effizient erstellen. <i>OBJEKTspektrum</i>, (RE/2014)."},"issue":"RE/2014"}]
