Sciweavers

4418 search results - page 33 / 884
» A Formal Approach to Computer Systems Requirements Documenta...
Sort
View
149
Voted
CORR
2011
Springer
216views Education» more  CORR 2011»
14 years 10 months ago
Approaches to Formal Verification of Security Protocols
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional cor...
Suvansh Lal, Mohit Jain, Vikrant Chaplot
125
Voted
REFSQ
2009
Springer
15 years 10 months ago
Composing Models for Detecting Inconsistencies: A Requirements Engineering Perspective
Abstract. [Context and motivation] Ever-growing systems’ complexity and novel requirements engineering approaches such as reuse or globalization imply that requirements are produ...
Gilles Perrouin, Erwan Brottier, Benoit Baudry, Yv...
115
Voted
SIGSOFT
2003
ACM
16 years 4 months ago
A strategy for efficiently verifying requirements
This paper describes a compositional proof strategy for verifying properties of requirements specifications. The proof strategy, which may be applied using either a model checker ...
Ralph D. Jeffords, Constance L. Heitmeyer
150
Voted
WER
2005
Springer
15 years 9 months ago
Requirement Elicitation Based on Goals with Security and Privacy Policies in Electronic Commerce
This paper describes a method for requirements elicitation based on goals for electronic commerce systems in agreement with security and privacy polices of the site. The method in...
Simara Vieira da Rocha, Zair Abdelouahab, Eduardo ...
160
Voted
RE
2001
Springer
15 years 8 months ago
Goal-Oriented Requirements Engineering: A Guided Tour
pture, at different levels of abstraction, the various objectives the system under consideration should achieve. Goal-oriented requirements engineering is concerned with the use o...
Axel van Lamsweerde