Sciweavers

121 search results - page 1 / 25
» Requirements model generation to support requirements elicit...
Sort
View
ASE
2008
120views more  ASE 2008»
13 years 8 months ago
Requirements model generation to support requirements elicitation: the Secure Tropos experience
In the last years several efforts have been devoted by researchers in the Requirements Engineering community to the development of methodologies for supporting designers during req...
Nadzeya Kiyavitskaya, Nicola Zannone
CAISE
2006
Springer
14 years 7 days ago
Designing Security Requirements Models Through Planning
The quest for designing secure and trusted software has led to refined Software Engineering methodologies that rely on tools to support the design process. Automated reasoning mech...
Volha Bryl, Fabio Massacci, John Mylopoulos, Nicol...
ASE
2007
121views more  ASE 2007»
13 years 8 months ago
Computer-aided Support for Secure Tropos
In earlier work, we have introduced Secure Tropos, a requirements engineering methodology that extends the Tropos methodology and is intended for the design and analysis of securit...
Fabio Massacci, John Mylopoulos, Nicola Zannone
CAISE
2009
Springer
14 years 3 months ago
Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects
In CAiSE 2006, we had presented a framework to support development of secure information systems. The framework was based on the integration of two security-aware approaches, the S...
Haralambos Mouratidis, Ali Sunyaev, Jan Jürje...
WER
2004
Springer
14 years 1 months ago
Towards Requirement Traceability in TROPOS
If we are to be successful in the development of the next generation of agent oriented systems we must deal with the critical issue of requirements traceability. Failure to do so w...
Andréa Castor, Rosa Pinto, Carla T. L. L. S...