<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>iStar for Safety-Critical Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Moniky Ribeiro</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jaelson Castro</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>João Pimentel</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Universidade Federal Rural de Pernambuco</institution>
          ,
          <country country="BR">Brazil</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Universidade Federal de Pernambuco</institution>
          ,
          <addr-line>Campus Recife</addr-line>
          ,
          <country country="BR">Brazil</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Context: Safety-Critical Systems is a system whose failure or malfunction may lead to damage or loss of life, destruction of property, loss of missions or environmental damage. Objective: This work proposes iStar4Safety, an extension of the iStar 2.0 language to enable the modeling of safety requirements. Method: The definition of new constructs to model specific safetyrelated concerns was performed by analyzing the essential concepts defined by the specialized literature. Moreover, the language metamodel is proposed along with its constraint rules. Results: The definition of iStar4Safety, a goal-oriented requirements language that enables the modeling of safety concerns in the early stage of system development. An Insulin Infusion Pump System was used to illustrate the use of the new language. A modeling tool was developed and is available for public use. Conclusions: The results of a preliminary evaluation indicate that the iStar4Safety language is suitable for describing the requirements of safety-critical systems. Furthermore, it was considered simple and easy to use while preserving the constructs of the iStar 2.0 language.</p>
      </abstract>
      <kwd-group>
        <kwd>Requirements Engineering</kwd>
        <kwd>Safety-Critical Systems</kwd>
        <kwd>iStar</kwd>
        <kwd>Safety</kwd>
        <kwd>Extension</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        A Safety-Critical System (SCS) involves both hardware and software components so
that, if they fail or behave unexpectedly may ensue damage to people or property,
significant financial losses, damage to the environment or even loss of life [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
Therefore, to avoid unacceptable or unwanted behaviors of these Safety-Critical
Systems, more care, and rigor in their development is required when compared to
traditional information systems. Software components of SCSs are in charge of
critical functions in areas such as aeronautics, automotive, healthcare, robotics, power
generation, among others. During the development of these systems, steps must be
taken to ensure hazards' mitigation to prevent accidents.
      </p>
      <p>
        In this paper, we propose the iStar4Safety language [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. This new language is
appropriate for the modeling of safety requirements that comply with Preliminary
Safety Analysis (PSA). Thus, the safety requirements will be defined as early as
possible in the development process of Safety-Critical System. The iStar4Safety
extends the iStar 2.0 language by adding four new constructs and a link. We propose
a metamodel for the new language in conjunction with some constraint rules, and also
an illustration of the use of extension in modeling a Safety-Critical System. To
facilitate the adoption of the new iStar4Safety modeling language, we have developed
the piStar-4Safety tool1, which is an extension of the piStar tool [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
2
      </p>
      <p>
        Related Work
The KAOS language described in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] is a goal-oriented modeling language with a set
of well-established formal analysis techniques. An important concept in the KAOS
language is the idea of an obstacle that allows the representation of situations where
some fact can obstruct the satisfaction of a goal, expectation or requirement.
However, there are no extensions of KAOS for Safety-Critical Systems in the
literature.
      </p>
      <p>
        Secure Tropos [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] is an extension of the Tropos methodology [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] which adds the
concept of security constraint, as well as extends the concepts of dependency, goal,
task, and resource from the native language to address security concerns. Threats to
security goals are circumstances that can cause losses, represented by threat construct.
But, it is not appropriate to address safety concerns.
      </p>
      <p>
        RiskML [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] is a modeling framework that uses conceptual modeling to assess
risks in the adoption of open source software (OSS) components. The framework is
based on the ability to explore OSS measures as possible risk indicators, and to relate
them to higher level organizational elements. Yet, key other concepts related to safety
issues are not considered.
3
      </p>
      <p>
        Safety Requirements Extension: iStar4Safety
The iStar4Safety extension is intended to model safety requirements as early as
possible during the development of Safety-Critical Systems. In a previous work [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]
several key concepts required for Preliminary Safety Analysis (PSA) in
SafetyCritical Systems were defined. Because the iStar 2.0 language is unable to model
these concepts, we have decided to develop this new extension.
      </p>
      <p>
        Below we present the table 1 that describes the key safety concepts that are
requirements to be modeled during a Preliminary Safety Analysis (PSA) based on a
literature review and opinions of safety experts [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] and how such concepts are
covered by iStar4Safety.
      </p>
      <p>
        The development of iStar4Safety consisted in the creation of this metamodel,
specification of the constraint rules and definition of the concrete syntax [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Then, a
modeling tool was adapted to provide tool support for the creation of iStar4Safety
models.
1 The piStar-4Safety tool can be found at: http://www.cin.ufpe.br/~jhcp/pistar/4safety/
iStar4Safety
The concept of an
accident is implicit in
iStar4Safety, as an
accident is a consequence of a
Hazard element obstructs
a Safety Goal
A Hazard element
A Hazard element
refining other Hazard
A Hazard element
A Safety Task element
Trees of Safety Tasks and
Safety Resources
A Safety Resource
element
The accidentImpactLevel
property in Safety Goal
element
The Obstructs link and
AND/OR refinements
2 - Hazard
3- Cause of Hazard
4 - Environmental
Condition
5 - Functional
Requirement
6 - Safety strategies
      </p>
      <p>Safety
7 - Resources
8 - Accident Impact Level
9 - Relationship between
constructs related to
hazards.</p>
      <p>
        It is a state or conditions of a given system that
added to the other conditions of the
environment around it will inevitably lead to an
accident [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        It is represented by a condition that alone or
associated with others, is/are sufficient for the
related hazard to occur. [
        <xref ref-type="bibr" rid="ref12 ref2 ref7">2, 12, 7</xref>
        ].
      </p>
      <p>It is a set of components and their properties,
including physical, cultural, among others,
that, although not part of the system, can affect
their behavior.</p>
      <p>These are the functional requirements used to
mitigate or prevent the effects of failures
identified in the safety analysis.</p>
      <p>
        These actions aim to mitigate the consequences
of a possible accident. Each mitigation has a
cost to its achievement, which most often
involves the consumption of some resource
[
        <xref ref-type="bibr" rid="ref1 ref12">12, 1</xref>
        ].
      </p>
      <p>In the context of Safety-Critical Systems,
resources are the assets required for the correct
functioning of critical requirements.</p>
      <p>Defines how critical the accident is to the
safety of the system. This level can have five
values: (1) Catastrophic (2)
Hazardous/SevereMajor (3) Major (4) Minor (5) No Effect.</p>
      <p>Hazards should obstruct safety goals and, also,
can be caused by other hazards or be mitigated
by safety tasks through AND/OR refinements.</p>
      <p>
        As shown in Figure 1, the metamodel was created preserving the original iStar 2.0
metamodel [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] (yellow elements) and adding the new iStar4Safety elements (purple).
We represent the metamodel by a UML class diagram following the MOF 2.4.1
standard of the OMG. Safety Resource is a specialization of a resource. The Safety
Task element is, in turn, a Task class specialization. These two elements, associated
or not, can mitigate the hazards, forming some safety strategies.
      </p>
      <p>The Safety Goal and Hazard classes are specializations of the Goal class of iStar
2.0. Elements of the Hazard class can obstruct Safety Goals, represented by a new
obstructs link. Hazards are conceptualized as an specialization of goals because they
can be considered anti-goals – i.e., that are desired not to happen. We prefer to
represent hazards with a goal specialization due to the need to demonstrate that the
hazard is differentiated because it is an element that is opposite to the goal, ie,
obstructs its full realization. Hence, hazards should be avoided.</p>
      <p>Additionally, elements of the Safety Goal class have the accident impact level
property that can take one of five values according to the level of the accident that
will happen if the safety goal is obstructed.</p>
      <p>
        Metamodels may need to describe further restrictions on the representation of all
language specificities, generally, additional descriptions are defined in natural
language or through some formal language. Because iStar4Safety is a conservative
extension, we retain the iStar 2.0 constraints defined in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and add new constraints
related to this extension.
      </p>
      <p>We have defined the new constraints of the iStar4Safety metamodel in natural
language:
– Constraint rule 1 – The iStar4Safety constructs cannot be dependum elements.
– Constraint rule 2 - A safety goal can only be refined by safety goals or refined
by hazards, and cannot be refined by both elements at the same time.
– Constraint rule 3 - Only hazards- root may be related to safety goals.
– Constraint rule 4 - Only hazards-leaf can be associated with safety tasks.
– Constraint rule 5 - Every hazard-leaf must have at least one associated safety
strategy for him.</p>
      <p>
        When defining the concrete syntax of the language we have aimed for its
simplicity, that is, to use the smallest possible number of new constructs and
representations in order not to hinder the learning of the language. A simple graphical
representation allows modelers to create pen-and-paper diagrams without much
hassle. Therefore, we chose to use the lightweight extension mechanism [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. The
textual stereotype, which is the name of the construct between the symbols "&lt;&lt; &gt;&gt;",
is the lightweight option most used to represent specialized nodes [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>For the creation of the graphical constructs, we have used the same shape of the
parent classes, with different colors (light red color and dark red color), associated
with stereotypes containing the name of the specialized construct. According to
Figure 2, the element (A) of the figure represents the Safety Goal construct and the
element (B) indicates the Hazard construct, while the element (C) represents the
Safety Task construct and a Safety Resource is represented by element (D). Finally,
the element (E) is the graphical representation of the obstructs link.
4</p>
      <p>
        iStar4Safety Illustration
The Insulin Infusion Pump System was adapted from [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. An Insulin Infusion Pump
is a device intended to deliver rapid-acting insulin dosages through a catheter placed
under the patient's skin to treat Type I diabetes mellitus while maintaining the
adequate glucose level in the patient's blood. In this example, we have used a subset
of the features.
      </p>
      <p>The patient actor, represented by figure 2, has three safety goals. The "Receiving
correct amount of insulin" safety goal is refined by the "Do not receive higher than
correct insulin dosage" and "Do not receive lower than correct insulin dosage" safety
goals.</p>
      <p>As an example, we will describe the safety goal "Do not receive higher than correct
insulin dosage". This safety goal can be obstructed by the hazard of "Insulin-free
flow". The hazard of insulin-free flow can be caused by the hazard of "Valves
broken in delivery path". This hazard, in turn, can be mitigated by the patient
performing the safety task "Constantly check the delivery path". This task makes use
of the "Delivery path" safety resource.</p>
      <p>
        The definition of the necessary concepts for early requirements modeling was
based on our previous work [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] that identified several key concepts necessary for the
Initial Analysis of Safety Requirements of Safety-Critical Systems. In order to define
the elements of the new language, we have proposed the iStar4Safety metamodel,
together with some constraint rules. The graphical constructs, that is, their concrete
syntax, were also defined. As an additional step, a piStar-4Safety tool was proposed
to support the modeling with the new language. The new language was illustrated by
means of an Insulin Infusion Pump System. A quality assessment, together with
expert opinion check has been made, allowing us to verify that the new language is
complete, consistent, and does not conflict with the iStar 2.0 language [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and other
extensions. We have also used an empirical method to evaluate the new language
[
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Finally, the extension was approved for inclusion in the CATIE catalog of iStar
extensions [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        As future work it is suggested:
– Analyze how to model Final Requirements of Safety-Critical Systems, seeking
to support to the modeling of the others Safety Analysis types;
– Implement all constraint rules in the piStar-4Safety tool;
– Evaluate the extension through controlled experiments [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], comparing the
extension created to other forms of modeling Early Requirements of
SafetyCritical Systems;
– Evaluate the Concrete Syntax developed, carrying out empirical studies;
– Reconsider how the accident impact level is represented.
      </p>
      <p>Acknowledgments: The authors thank CNPq &amp; FACEPE for their financial
support.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Asnar</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giorgini</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mylopoulos</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          :
          <article-title>Goal-driven risk assessment in requirements engineering</article-title>
          .
          <source>Requir. Eng</source>
          .
          <volume>16</volume>
          (
          <issue>2</issue>
          ),
          <fpage>101</fpage>
          -
          <lpage>116</lpage>
          (
          <year>Jun 2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Berry</surname>
            ,
            <given-names>D.M.:</given-names>
          </string-name>
          <article-title>The safety requirements engineering dilemma</article-title>
          .
          <source>In: Proceedings of the 9th International Workshop on Software Specification and Design</source>
          . pp.
          <fpage>147</fpage>
          -.
          <source>IWSSD '98</source>
          , IEEE Computer Society, Washington, DC, USA (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Castro</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kolp</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mylopoulos</surname>
          </string-name>
          , J.:
          <article-title>Towards requirements-driven information systems engineering: the tropos project</article-title>
          .
          <source>Information Systems</source>
          <volume>27</volume>
          (
          <issue>6</issue>
          ),
          <fpage>365</fpage>
          -
          <lpage>389</lpage>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Dalpiaz</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Franch</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horkoff</surname>
          </string-name>
          ,
          <source>J.: istar 2</source>
          .
          <article-title>0 language guide</article-title>
          . http://arxiv.org/abs/1605.07767
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Dardenne</surname>
          </string-name>
          , A.,
          <string-name>
            <surname>van Lamsweerde</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fickas</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Goal-directed requirements acquisition</article-title>
          .
          <source>Science of Computer Programming</source>
          <volume>20</volume>
          (
          <issue>1</issue>
          ),
          <fpage>3</fpage>
          -
          <lpage>50</lpage>
          (
          <year>1993</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Gonçalves</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Heineck</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Araújo</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Castro</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>CATIE: A catalogue of istar extensions</article-title>
          .
          <source>Cadernos do Ime. Série Informática</source>
          , v.
          <volume>48</volume>
          , p.
          <fpage>23</fpage>
          -
          <lpage>37</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Leveson</surname>
            ,
            <given-names>N.G.</given-names>
          </string-name>
          :
          <article-title>Safeware: System Safety and Computers</article-title>
          . ACM, New York, NY, USA (
          <year>1995</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Martins</surname>
            ,
            <given-names>L. E. G.</given-names>
          </string-name>
          ; Faria, H. d.;
          <string-name>
            <surname>Vecchete</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Cunha</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Oliveira</surname>
          </string-name>
          , T. d.;
          <string-name>
            <surname>Casarini</surname>
            ,
            <given-names>D. E.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Colucci</surname>
            ,
            <given-names>J. A.</given-names>
          </string-name>
          :
          <article-title>Development of a low-cost insulin infusion pump: Lessons learned from an industry case</article-title>
          .
          <source>In: Proceedings of the 2015 IEEE 28th International Symposium on Computer-Based Medical Systems</source>
          .
          <year>2015</year>
          .
          <source>(CBMS '15)</source>
          , p.
          <fpage>338</fpage>
          -
          <lpage>343</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Mouratidis</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giorgini</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Secure tropos: A security-oriented extension of the tropos methodology</article-title>
          .
          <source>Int. J. Soft. Eng. Knowl. Eng</source>
          .
          <volume>17</volume>
          (
          <issue>02</issue>
          ),
          <fpage>285</fpage>
          -
          <lpage>309</lpage>
          (apr
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Ribeiro</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Desenvolvimento de uma extensão da linguagem de modelagem iStar para Sistemas Críticos de Segurança - iStar4Safety (Development of an extension of the iStar modeling language for Safety Critical Systems -</article-title>
          iStar4Safety).
          <source>Master's thesis</source>
          , Universidade Federal de Recife (feb
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Siena</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Morandini</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Susi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Modelling risks in open source software component selection</article-title>
          . In
          <string-name>
            <surname>Yu</surname>
          </string-name>
          , E.,
          <string-name>
            <surname>Dobbie</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jarke</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Purao</surname>
          </string-name>
          , S., eds.:
          <source>Conceptual Modeling. Volume 8824 of Lecture Notes in Computer Science</source>
          . Springer International Publishing (
          <year>2014</year>
          )
          <fpage>335</fpage>
          -
          <lpage>348</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Vilela</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Castro</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Martins</surname>
            ,
            <given-names>L.E.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gorschek</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Silva</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Specifying safety requirements with gore languages</article-title>
          .
          <source>In: Proceedings of the 31st Brazilian Symposium on Software Engineering</source>
          . pp.
          <fpage>154</fpage>
          -
          <lpage>163</lpage>
          . SBES'17,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          , New York, NY, USA (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Wohlin</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Runeson</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Hst</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Ohlsson</surname>
            ,
            <given-names>M. C.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Regnell</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Wessln</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          : Experimentation in Software Engineering. Springer,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>E.S.K.</given-names>
          </string-name>
          :
          <article-title>Modelling Strategic Relationships for Process Reengineering</article-title>
          .
          <source>Ph.D. thesis</source>
          , Toronto, Ont.,
          <string-name>
            <surname>Canada</surname>
          </string-name>
          , Canada (
          <year>1995</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Gonçalves</surname>
            , E., de Oliveira,
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Monteiro</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Castro</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Araújo</surname>
          </string-name>
          , J.:
          <article-title>Understanding what is important in istar extension proposals: the viewpoint of researchers</article-title>
          .
          <source>Requirements Engineering</source>
          <volume>24</volume>
          ,
          <fpage>55</fpage>
          -
          <lpage>84</lpage>
          (
          <year>Mar 2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Gonçalves</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Castro</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Araújo</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Heineck</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>A systematic literature review of istar extensions</article-title>
          .
          <source>Journal of Systems and Software 137</source>
          ,
          <fpage>1</fpage>
          -
          <lpage>33</lpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Pimentel</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Castro</surname>
            ,
            <given-names>J.: piStar</given-names>
          </string-name>
          <string-name>
            <surname>Tool - A Pluggable Online Tool for Goal Modeling</surname>
          </string-name>
          ,
          <year>2018</year>
          IEEE 26th International Requirements Engineering Conference (RE), Banff,
          <string-name>
            <surname>AB</surname>
          </string-name>
          ,
          <year>2018</year>
          , pp.
          <fpage>498</fpage>
          -
          <lpage>499</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>