N degrees of separation: multi-dimensional separation of concerns
Proceedings of the 21st international conference on Software engineering
Requirements engineering: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Generative programming: methods, tools, and applications
Generative programming: methods, tools, and applications
Toward Reference Models for Requirements Traceability
IEEE Transactions on Software Engineering
Domain analysis: an introduction
ACM SIGSOFT Software Engineering Notes
Modularisation and composition of aspectual requirements
Proceedings of the 2nd international conference on Aspect-oriented software development
Aspect-Oriented Requirements Engineering for Component-Based Software Systems
RE '99 Proceedings of the 4th IEEE International Symposium on Requirements Engineering
Initial Industrial Experience of Misuse Cases in Trade-Off Analysis
RE '02 Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering
Early Aspects: A Model for Aspect-Oriented Requirements Engineerin
RE '02 Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering
Proceedings of the 3rd international conference on Aspect-oriented software development
Deriving security requirements from crosscutting threat descriptions
Proceedings of the 3rd international conference on Aspect-oriented software development
From Goals to Aspects: Discovering Aspects from Requirements Goal Models
RE '04 Proceedings of the Requirements Engineering Conference, 12th IEEE International
Modeling and Composing Scenario-Based Requirements with Aspects
RE '04 Proceedings of the Requirements Engineering Conference, 12th IEEE International
IEEE Software
Discovering aspects in requirements with repertory grid
Proceedings of the 2006 international workshop on Early aspects at ICSE
Feature-based survey of model transformation approaches
IBM Systems Journal - Model-driven software development
Feature Diagrams: A Survey and a Formal Semantics
RE '06 Proceedings of the 14th IEEE International Requirements Engineering Conference
The Detection and Classification of Non-Functional Requirements with Application to Early Aspects
RE '06 Proceedings of the 14th IEEE International Requirements Engineering Conference
Analysis of early aspects in requirements goal models: a concept-driven approach
Transactions on aspect-oriented software development III
Domain models are NOT aspect free
MoDELS'06 Proceedings of the 9th international conference on Model Driven Engineering Languages and Systems
A concern-oriented requirements engineering model
CAiSE'05 Proceedings of the 17th international conference on Advanced Information Systems Engineering
Concept analysis for product line requirements
Proceedings of the 8th ACM international conference on Aspect-oriented software development
Analysis of early aspects in requirements goal models: a concept-driven approach
Transactions on aspect-oriented software development III
Hi-index | 0.00 |
The early aspects community has received increasing attention among researchers and practitioners, and has grown a set of meaningful terminology and concepts in recent years, including the notion of requirements aspects. Aspects at the requirements level present stakeholder concerns that crosscut the problem domain, with the potential for a broad impact on questions of scoping, prioritization, and architectural design. Although many existing requirements engineering approaches advocate and advertise an integral support of early aspects analysis, one challenge is that the notion of a requirements aspect is not yet well established to efficaciously serve the community. Instead of defining the term once and for all in a normally arduous and unproductive conceptual unification stage, we present a preliminary taxonomy based on the literature survey to show the different features of an asymmetric requirements aspect. Existing approaches that handle requirements aspects are compared and classified according to the proposed taxonomy. In addition, we study crosscutting security requirements to exemplify the taxonomy's use, substantiate its value, and explore its future directions.