Validating requirements model of a B2B system

  • Ling Yin*
  • , Jing Liu
  • , Xiaoshan Li
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

It is very costly if a software project development has to recover from an error that is due to a mistake made in the construction of the requirements model. Validation of requirements model is thus always an effective means for detecting defects in the requirements model. In this paper, we present an approach to modeling requirements by UML with OCL, and the design of a tool EOC (Executable OCL Checker), that supports well-formed static checking for the OCL specification as well as the dynamic validation. We illustrate the approach and the tool by an example of B2B system. The requirements model of this system is validated by the prototyping executions of the system functions on the system states against the OCL constraints. The validation checks whether the execution of a use case violates the system invariants, and whether the requirements model is feasible according to its business workflow.

Original languageEnglish
Title of host publicationProceedings of the 2009 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009
PublisherIEEE Computer Society
Pages1020-1025
Number of pages6
ISBN (Print)9780769536415
DOIs
StatePublished - 2009
Event8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009 - Shanghai, China
Duration: 1 Jun 20093 Jun 2009

Publication series

NameProceedings of the 2009 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009

Conference

Conference8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009
Country/TerritoryChina
CityShanghai
Period1/06/093/06/09

Keywords

  • OCL
  • Requirements Model
  • UML
  • Validation

Fingerprint

Dive into the research topics of 'Validating requirements model of a B2B system'. Together they form a unique fingerprint.

Cite this