Literature Survey on Technologies for Developing Privacy-aware Software, accepted at ESPRE 2016.

Atsuo Hazeyama, Hironori Washizaki, Nobukazu Yoshioka, Haruhiko Kaiya, Takao Okubo, “Literature Survey on Technologies for Developing Privacy-aware Software,” 3rd International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE), co-located with the RE’16 conference, 12-13 September 2016, Beijing, China (to appear)

Software development that considers privacy protection is required with the progress of information and communication environments. However, a body of knowledge does not exist for developing privacy-aware software. This paper introduces studies that address knowledge regarding the development of privacy-aware software based on a literature survey, and de-scribes current status and future direction intended toward building a knowledge base for privacy-aware software development.

TENTO代表 竹林暁様、株式会社フジテレビキッズ代表取締役社長 小畑芳和様より教授就任のお祝いを頂戴

教授就任にあたりプログラミングスクールTENTO代表 竹林暁様、株式会社フジテレビキッズ代表取締役社長 小畑芳和様よりお祝いを頂戴しました。誠に有難うございます。プログラミング教育や研究等、今後とも何卒宜しくお願い致します。

Cl936opUgAA9OeA Cl936onUkAAC93j

門倉研・宇都宮研・深澤研・鷲崎研 同窓会 コンピュータ懇談会(コンこん会)開催

門倉研・宇都宮研・深澤研・鷲崎研 合同の同窓会 コンピュータ懇話会(コンこん会)を盛大に2016年6月25日に早稲田大学にて開催しました。多くの参加、有難うございました。 On June 25, a meeting and party of alumni of Fukazawa-lab, Washizaki-lab and former related labs, named “Com-Kon-Kai”, was successfully held in our campus. Thank you for your attendance!


実践的ソフトウェア品質測定評価のための4つの「落とし穴」と 7つの「コツ」: ゴール指向、不確実性、機械学習、実態調査ほか, 品質管理学会誌「品質」へ寄稿

鷲崎弘宜, “実践的ソフトウェア品質測定評価のための4つの「落とし穴」と  7つの「コツ」: ゴール指向、不確実性、機械学習、実態調査ほか”, 品質, Vol.46, No.3, 品質管理学会, 2016. (to appear)


Exhaustive and efficient identification of rationales using GQM+Strategies with stakeholder relationship analysis, accepted at IEICE Transactions on Information and Systems (SCIE, DBLP indexed)

Takanobu KOBORI, Hironori WASHIZAKI, Yoshiaki FUKAZAWA, Daisuke HIRABAYASHI, Katsutoshi SHINTANI, Yasuko OKAZAKI, and Yasuhiro KIKUSHIMA, “Exhaustive and efficient identification of rationales using GQM+Strategies with stakeholder relationship analysis,” IEICE Transactions on Information and Systems, Vol.E99-D, 2016. (SCIE, DBLP indexed) (to appear)

To achieve overall business goals, GQM+Strategies is one approach that aligns business goals at each level of an organization to strategies and assesses the achievement of goals. Strategies are based on rationales (contexts and assumptions). Because extracting all rationales is an important process in the GQM+Strategies approach, we propose the Context-Assumption-Matrix (CAM), which refines the GQM+Strategies model by extracting rationales based on analyzing the relationships between stakeholders, and the process of using GQM+Strategies with CAM effectively. To demonstrate the effectiveness of the CAM and the defined process, we conducted three experiments involving students majoring in information sciences at two different Japanese universities. Moreover, we applied the GQM+Strategies approach with CAM to the Recruit Sumai Company in Japan. The results reveal that compared to GQM+Strategies alone, GQM+Strategies with CAM can extract rationales of the same quality more efficiently and exhaustively.

M0渡邊君、”GO-MUC: ゴール指向によるユーザ・ビジネス要求を満たす戦略立案支援”HCD-Netフォーラム2016 ポスター発表


内田 ちひろ、本田 澄、渡邊 泰宏、鷲崎 弘宜、深澤良彰、小川 健太郎、八木 智章、石垣 光香子、中川 雅史、”GO-MUC (Goal-Oriented Measurement for Usability and Conflict): ゴール指向によるユーザ・ビジネス要求を満たす戦略立案支援”、 HCD-Netフォーラム2016, ポスター, 東海大学高輪キャンパス, 2016年6月11日

image002 image004

A Taxonomy for Program Metamodels in Program Reverse Engineering accepted at ICSME 2016 (CORE Rank A)

Hironori Washizaki, Yann-Gael Gueheneuc, Foutse Khomh, “A Taxonomy for Program Metamodels in Program Reverse Engineering,” 32nd IEEE International Conference on Software Maintenance and Evolution (ICSME), October 2-10, Raleigh, North Carolina, USA. (to appear)

Metamodels are frequently used during program reverse engineering activities to describe and analyze constituents and relations between the constituents of a program for supporting program comprehension, maintenance, and extension. Reverse engineering tools often define their own metamodels according to their own purposes and intended features. These metamodels have all advantages, and limitations that might have been solved by others. Although there are some existing works on the evaluation and comparison of these metamodels and tools, none of them consider all the possible characteristics and limitations to provide a comprehensive guidance for classification, comparison, reuse and extension of program metamodels. To guide practitioners and researchers to classify, compare, reuse, and extend program metamodels and their corresponding reverse engineering tools according to their goals, we first establish a conceptual framework with definitions of program metamodels and related concepts. Based on this framework, we provide a comprehensive taxonomy named Program Metamodel TAxonomy (ProMeTA), which incorporates characteristics that are newly identified into those that have already been stated in previous works identified by a systematic literature survey on program metamodels, while keeping the orthogonality of the entire taxonomy. We validate the taxonomy in terms of its orthogonality and usefulness through the classification of popular metamodels.

Implementation Support of Security Design Patterns Using Test Templates, accepted at Information, Special Issue on Evaluating the Security of Complex Systems (DBLP Indexed)

Masatoshi Yoshizawa, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya and Nobukazu Yoshioka, “Implementation Support of Security Design Patterns Using Test Templates,” Information, Special Issue on Evaluating the Security of Complex Systems (DBLP Indexed), 2016. (to appear)

Security patterns are intended to support software developers as the patterns encapsulate security expert knowledge. However, these patterns may be inappropriately applied because most developers are not security experts, leading to threats and vulnerabilities. Here we propose a support method for security design patterns in the implementation phase of software development. Our method creates a test template from a security design pattern, consisting of an “aspect test template” to observe the internal processing and a “test case template”. Providing design information creates a test from the test template with a tool. Because our test template is reusable, it can easily perform a test to validate a security design pattern. In an experiment involving four students majoring in information sciences, we confirm that our method can realize an effective test, verify pattern applications, and support pattern implementation.