Sciweavers

489 search results - page 19 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
INDIASE
2009
ACM
14 years 8 days ago
Automated review of natural language requirements documents: generating useful warnings with user-extensible glossaries driving
We present an approach to automating some of the quality assurance review of software requirements documents, and promoting best practices for requirements documentation. The syst...
Prateek Jain, Kunal Verma, Alex Kass, Reymonrod G....
SEKE
2007
Springer
14 years 1 months ago
Requirement Analysis Evolution through Patterns
This paper presents a strategy, based on requirement patterns (RP), aimed at improving the requirement analysis discipline by allowing business analysts (BA) to produce more relia...
Luca Vetti Tagliati, Roger Johnson, George Roussos
DAWAK
2006
Springer
13 years 9 months ago
Towards Multidimensional Requirement Design
Abstract. Data warehouses (DW) main objective is to facilitating decisionmaking. Thus their development has to take into account DW project actor requirements. While much recent re...
Estella Annoni, Franck Ravat, Olivier Teste, Gille...
SAC
2008
ACM
13 years 7 months ago
Configuring features with stakeholder goals
Goal models are effective in capturing stakeholder needs at the time when features of the system-to-be have not yet been conceptualized. Relating goals to solution-oriented featur...
Yijun Yu, Julio Cesar Sampaio do Prado Leite, Alex...
EDBT
2009
ACM
145views Database» more  EDBT 2009»
13 years 11 months ago
An efficient online auditing approach to limit private data disclosure
In a database system, disclosure of confidential private data may occur if users can put together the answers of past queries. Traditional access control mechanisms cannot guard a...
Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaid...