Sciweavers

5180 search results - page 111 / 1036
» Requirements Engineering
Sort
View
ESSOS
2009
Springer
15 years 6 months ago
Pattern-Based Confidentiality-Preserving Refinement
Abstract. We present an approach to security requirements engineering, which makes use of special kinds of problem frames that serve to structure, characterize, analyze, and solve ...
Holger Schmidt
SEW
2005
IEEE
15 years 8 months ago
Using Visualization to Understand Dependability: A Tool Support for Requirements Analysis
Dealing with dependability requirements is a complex task for stakeholders and analysts as many different aspects of a system must be taken into account at the same time: services...
Paolo Donzelli, Daniel Hirschbach, Victor R. Basil...
130
Voted
INFOCOM
2003
IEEE
15 years 7 months ago
Internet Quarantine: Requirements for Containing Self-Propagating Code
— It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have...
David Moore, Colleen Shannon, Geoffrey M. Voelker,...
86
Voted
JSS
2002
90views more  JSS 2002»
15 years 2 months ago
Visual requirement representation
Most software development errors are caused by incorrect or ambiguous requirement specifications gathered during the requirement elicitation and analysis phase. For the past decad...
Deng-Jyi Chen, Wu-Chi Chen, Krishna M. Kavi
129
Voted
ECOWS
2007
Springer
15 years 8 months ago
Management Requirements of Web Service Compositions
Several works have addressed the management of individual Web Services. However, the specific management requirements of workflow-based web service compositions such as those speci...
Anis Charfi, Rainer Berbner, Mira Mezini, Ralf Ste...