Sciweavers

18769 search results - page 51 / 3754
» Requirements Models in Context
Sort
View
VAMOS
2007
Springer
15 years 9 months ago
Requirements Modelling and Design Notations for Software Product Lines
Although feature modelling is a frequently used approach to the task of modelling commonality and variability within product lines, there is currently no standard modelling notati...
T. John Brown, Rachel Gawley, Ivor T. A. Spence, P...
IJNSEC
2008
88views more  IJNSEC 2008»
15 years 3 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King
ER
2009
Springer
166views Database» more  ER 2009»
15 years 10 months ago
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
Golnaz Elahi, Eric S. K. Yu, Nicola Zannone
WER
2004
Springer
15 years 9 months ago
Integrating Natural Language Oriented Requirements Models into MDA
MDA is a software development framework where the core is a set of automatic transformation of models. One of these models, the CIM, is used to define the business process model. T...
Maria Carmen Leonardi, María Virginia Mauco
EDOC
2006
IEEE
15 years 9 months ago
Requirements Traceability and Transformation Conformance in Model-Driven Development
The variety of design artefacts (models) produced in a model-driven design process results in an intricate relationship between requirements and the various models. This paper pro...
João Paulo A. Almeida, Pascal van Eck, Mari...