: Before any of the current “agile” development methods, Earned Value Management provided information for planning and controlling complex projects by measuring how much “val...
This paper presents a model of incremental change that consists of concept location, impact analysis, actualization, change propagation, supporting refactorings, and testing. Repe...
Agile development methodologies are gaining acceptance in the software industry. If they are to be used for constructing securitycritical solutions, what do we do about assurance?...
It has been reported that many software companies do not use existing requirements engineering approaches. This indicates that there is room and opportunity for improving the usab...
In order to develop security critical Information Systems, specifying security quality requirements is vitally important, although it is a very difficult task. Fortunately, there ...