Sciweavers

383 search results - page 13 / 77
» Reusing Scenario Based Approaches in Requirement Engineering...
Sort
View
FASE
2010
Springer
13 years 6 months ago
A Verifiable Modeling Approach to Configurable Role-Based Access Control
Role-based access control (RBAC) is a popular access control model for enterprise systems due to its economic benefit and scalability. There are many RBAC features available, each ...
Dae-Kyoo Kim, Lunjin Lu, Sangsig Kim
AI
2000
Springer
13 years 7 months ago
Proving theorems by reuse
We investigate the improvement of theorem proving by reusing previously computed proofs. We have developed and implemented the PLAGIATOR system which proves theorems by mathematic...
Christoph Walther, Thomas Kolbe
ICSE
2004
IEEE-ACM
14 years 8 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
WWW
2005
ACM
14 years 8 months ago
A service creation environment based on end to end composition of Web services
The demand for quickly delivering new applications is increasingly becoming a business imperative today. Application development is often done in an ad hoc manner, without standar...
Vikas Agarwal, Koustuv Dasgupta, Neeran M. Karnik,...
SEAA
2008
IEEE
14 years 2 months ago
A Meta-model for the Assessment of Non-Functional Requirement Size
Non-functional requirements (NFRs) pose unique challenges in estimating the effort it would take to implement them. This is mainly because of their unique nature; NFRs are subject...
Mohamad Kassab, Maya Daneva, Olga Ormandjieva