Sciweavers

657 search results - page 7 / 132
» Secure and Usable Requirements Engineering
Sort
View
SSIRI
2010
13 years 5 months ago
Model-Based Argument Analysis for Evolving Security Requirements
Thein Than Tun, Yijun Yu, Charles B. Haley, Bashar...
EDOC
2007
IEEE
14 years 1 months ago
Model-Driven Engineering for Requirements Analysis
Requirements engineering (RE) encompasses a set of activities for eliciting, modelling, agreeing, communicating and validating requirements that precisely define the problem doma...
Benoit Baudry, Clémentine Nebut, Yves Le Tr...
ACSAC
1999
IEEE
13 years 11 months ago
How to Cheat at the Lottery (or, Massively Parallel Requirements Engineering)
Collaborative software projects such as Linux and Apache have shown that a large, complex system can be built and maintained by many developers working in a highly parallel, relat...
Ross J. Anderson
ASE
2008
120views more  ASE 2008»
13 years 7 months ago
Requirements model generation to support requirements elicitation: the Secure Tropos experience
In the last years several efforts have been devoted by researchers in the Requirements Engineering community to the development of methodologies for supporting designers during req...
Nadzeya Kiyavitskaya, Nicola Zannone
EUROPKI
2004
Springer
14 years 23 days ago
Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures
The last years have seen a major interest in designing and deploying trust management and public key infrastructures. Yet, it is still far from clear how one can pass from the orga...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...