—We describe and analyze the process of requirements development in scenario-based design through consideration of a case study. In our project, a group of teachers and system de...
John M. Carroll, Mary Beth Rosson, George Chin Jr....
Role-Based Access Control (RBAC) is increasingly used for ensuring security and privacy in complex organizations such as healthcare institutions. In RBAC, access permissions are g...
Requirements volatility is an important risk factor for software projects. Software measures can help in quantifying and predicting this risk. In this paper, we present an industr...
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
In this paper we introduce the work done to define a framework for requirements and architectural understanding in biomedical grid computing systems. A set of core requirements fo...
Chris Mattmann, Vito Perrone, Sean C. Kelly, Danie...