Sciweavers

716 search results - page 9 / 144
» Security Requirements Engineering: A Framework for Represent...
Sort
View
REFSQ
2009
Springer
14 years 3 months ago
Composing Models for Detecting Inconsistencies: A Requirements Engineering Perspective
Abstract. [Context and motivation] Ever-growing systems’ complexity and novel requirements engineering approaches such as reuse or globalization imply that requirements are produ...
Gilles Perrouin, Erwan Brottier, Benoit Baudry, Yv...
FASE
2009
Springer
14 years 3 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel
AOSD
2004
ACM
14 years 2 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
SIGSOFT
2004
ACM
14 years 9 months ago
Reasoning about partial goal satisfaction for requirements and design engineering
Exploring alternative options is at the heart of the requirements and design processes. Different alternatives contribute to different degrees of achievement of non-functional goa...
Emmanuel Letier, Axel van Lamsweerde
AOSD
2009
ACM
13 years 6 months ago
Concept analysis for product line requirements
Traditional methods characterize a software product line's requirements using either functional or quality criteria. This appears to be inadequate to assess modularity, detec...
Nan Niu, Steve M. Easterbrook