Previous Next V-Model Official Homepage by IABG  
Header  
SD 1.2: Description of Application System  

  SE1.2 - Anwendungssystem beschreiben

Contents  
  • Product Flow
  • Handling
  • Roles
  • Methods
  •  
  • Tools Requirements
  • External Norms
  • Pre-Tailoring forms
  • Links to the V-Model Mailinglist
  • Product Flow

    From Product to Methods Tool Req. Ext. Norms
    Activity State Chapter Title Activity State
    External - All External Specifications (customer) - -     /ISO IEC 12207/

    Acquis. Proc.:
    Initiation,

    Devlp. Proc.:
    Syst. Req. Analysis

    SD1.1 being proc. Existing User Requirements - -    
    - - 6.1 User Requirements.
    Preliminary System Description
    SD1.3
    SD1.4
    SD1.5
    SD1.6
    being proc. COM
    CRC
    DFM
    IAM
    PRODIAG
    SSM
    STMO
    UCM
    SSD01
    SSD05
    SSD07
    SSD22
    SSD23
    SSD25
    SSD26
    SSD27
    SSD28
    - - 3 User Requirements.
    IT Security Objective
      SSD01

    + "Chapter" are extra columns from the original printed version of GD 250

    Handling

    An overall horizon must be specified for the system functionality within the scope of this activity. This is realized by means of a preliminary system description which is the background for all further refinements and additions of the User Requirements.

    The description of the overall horizon has to consider the following criteria:

    In addition to the operational requirements for the System, the customer must specify the IT security objectives. The security objectives may consist of certain protection goals for some operational functions or processed information with regard to availability, integrity and confidentiality (i. e. reliability), or else an already specified security policy to be realized in the overall System. It must be specified in the User Requirements if, and if yes, which requirements with regard to availability, integrity or confidentiality exist for certain functions or information. The IT security objectives are the basis for a threat and risk analysis from which IT security requirements for the elimination of intolerable risks can be concluded. The IT security requirements must then be realized by the corresponding IT security measures.

    ---------- The following part is an extension of the original printed version of GD 250 -----------

    Roles

    Role Participation
    System Analyst responsible
    User cooperating

    Methods

    Product Methods Allocation Use
    Chapter 6.1
    User Requirements.
    Preliminary System Description
    COM - Class/Object Modeling (2) Generate
    CRC - Class Responsibility Collaboration (2) Generate
    DFM - Data Flow Modeling Generate
    IAM - Interaction Modeling (2) Generate
    PRODIAG - Process Diagrams (2) Generate
    SSM - Subsystem Modeling (2) Generate
    STMO - State Modeling in the OO Field (1) Generate
    UCM - Use Case Modeling (2) Generate

    Notes:
    (1) Method STMO is to be applied for the dynamic system modeling in object-oriented procedures.
    (2) The methods have to be applied in object-oriented developments.

    Tools Requirements

    Product Functional Tools Requirements
    Chapter 6.1
    User Requirements.
    Preliminary System Description
    SSD01 - Recording Requirements
    SSD05 - Supporting Function Structure
    SSD07 - Supporting Modeling of Information Flows
    SSD22 - Supporting Class/Object Modeling
    SSD23 - Supporting Subsystem Modeling
    SSD25 - Supporting Process Diagrams
    SSD26 - Supporting Use Case Modeling
    SSD27 - Supporting State Modeling in the Object-Oriented Field
    SSD28 - Supporting Interaction Modeling
    Chapter 3
    User Requirements.
    IT Security Objective
    SSD01 - Recording Requirements

    External Norms

    Norm Process Chapter Obs.
    /ISO IEC 12207/ Acquisition Process Initiation (s. Part 3
    ISO 3.2.1)
    Development Process System Requirements Analysis

    Pre-Tailoring forms

    Pre-tailoring Forms SD Products Implementing
    Conditions
    Small Administrative IT Projects SD1.2 x User Requirements                                 SD1.2 x Basic Requirements          
    Medium Administrative IT Projects SD1.2 x User Requirements                                 SD1.2 x Basic Requirements          
    Large Administrative IT Projects SD1.2 x User Requirements                                 SD1.2 x Basic Requirements          
    Small/Medium Technical-Scientific IT Projects SD1.2 x User Requirements                                 SD1.2 x Basic Requirements          
    Large Technical-Scientific IT Projects SD1.2 x User Requirements                                 SD1.2 x Basic Requirements          
    Selection, Procurement and Adjustment of Off-the-Shelf Products SD1.2 x User Requirements                                 SD1.2 x Basic Requirements          

    Matrix Entries:

    Always required
    Always required under given circunstances
    Not required
    Description of data or database only

    Links to the V-Model Mailinglist

    Mail 0305 - Re: Anwenderforderung zur Datenhaltung auf Ebene der SE 1.2
    Mail 0301 - Re: Anwenderforderung zur Datenhaltung auf Ebene der SE 1.2
    Mail 0247 - Re: Ist die inkrementelle Entwicklung richtig dargestellt (247)
    Mail 0246 - Re: Umfang von SE 1.2 bei inkrementeller Entwicklung (246)
    Mail 0242 - Umfang von SE 1.2 bei inkrementeller Entwicklung (242)

    Previous Next GDPA Online Last Updated 01.Jan.2002 Updated by Webmaster Last Revised 01.Jan.2002 Revised by Webmaster