Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
In the United States, federal and state regulations prescribe stakeholder rights and obligations that must be satisfied by the requirements for software systems. These regulations ...
Travis D. Breaux, Matthew W. Vail, Annie I. Ant&oa...
This paper presents a method that can be used for the elicitation and speci cation of requirements and high-level design. It supports stakeholder-based modeling, rapid feasibility...
Functional prototypes and simulations are a well recognised and valued tool for building a shared understanding of requirements between users and developers. However, the developm...