Sciweavers

657 search results - page 8 / 132
» Secure and Usable Requirements Engineering
Sort
View
ITRUST
2005
Springer
14 years 27 days ago
Modeling Social and Individual Trust in Requirements Engineering Methodologies
Abstract. When we model and analyze trust in organizations or information systems we have to take into account two different levels of analysis: social and individual. Social leve...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
WWW
2007
ACM
14 years 8 months ago
Integrating value-based requirement engineering models to webml using vip business modeling framework
Requirement engineering (RE) is emerging as an increasingly important discipline for supporting Web application development, as these are designed to satisfy diverse stakeholder n...
Farooque Azam, Zhang Li, Rashid Ahmad
ICSE
2007
IEEE-ACM
14 years 1 months ago
Agility and Experimentation: Practical Techniques for Resolving Architectural Tradeoffs
This paper outlines our experiences with making architectural tradeoffs between performance, availability, security, and usability, in light of stringent cost and time-to-market c...
T. C. Nicholas Graham, Rick Kazman, Chris Walmsley
IMCS
2007
78views more  IMCS 2007»
13 years 7 months ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri
ICWE
2005
Springer
14 years 27 days ago
Adding Usability to Web Engineering Models and Tools
In this paper, we examine how the task of creating usable websites can be made more efficient. Models and generation of websites have been a central issue for Web Engineering over ...
Richard Atterer, Albrecht Schmidt