Sciweavers

3024 search results - page 111 / 605
» Requirement Engineering in Service-Oriented System Engineeri...
Sort
View
QSIC
2006
IEEE
15 years 10 months ago
PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application
Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for the system before they use the syst...
Haruhiko Kaiya, Kouta Sasaki, Kenji Kaijiri
RE
2010
Springer
14 years 11 months ago
Fuzzy Goals for Requirements-Driven Adaptation
Self-adaptation is imposing as a key characteristic of many modern software systems to tackle their complexity and cope with the many environments in which they can operate. Self-a...
Luciano Baresi, Liliana Pasquale, Paola Spoletini
MKWI
2008
113views Business» more  MKWI 2008»
15 years 6 months ago
A Rule-based Middleware for Business Process Execution
Abstract. While past research in service oriented computing has focused on the fairly static functional description and the operators of services the dynamic and flexible compositi...
Adrian Paschke, Alexander Kozlenkov
AOSD
2004
ACM
15 years 10 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
ICSE
2003
IEEE-ACM
16 years 4 months ago
Requirements Discovery during the Testing of Safety-Critical Software
This paper describes the role of requirements discovery during the testing of a safety-critical software system. Analysis of problem reports generated by the integration and syste...
Robyn R. Lutz, Ines Carmen Mikulski