Sciweavers

674 search results - page 7 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
IASSE
2004
13 years 9 months ago
Execution of A Requirement Model in Software Development
Latest research results have shown that requirements errors have a prolonged impact on software development and that they are more expensive to fix during later stages than early ...
Wuwei Shen, Mohsen Guizani, Zijiang Yang, Kevin J....
WER
2005
Springer
14 years 1 months ago
Requirement Elicitation Based on Goals with Security and Privacy Policies in Electronic Commerce
This paper describes a method for requirements elicitation based on goals for electronic commerce systems in agreement with security and privacy polices of the site. The method in...
Simara Vieira da Rocha, Zair Abdelouahab, Eduardo ...
RE
2006
Springer
13 years 7 months ago
Improving the Modeling of Use Case Relationship
Use-cases often capture the expected behaviors of a system and its components. During requirements analysis, it is important to understand and model the relationship among differe...
Jian Tang, Donglin Liang
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
14 years 2 months ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...
JOT
2008
108views more  JOT 2008»
13 years 7 months ago
Requirements analysis for large scale systems
All readers of this paper most likely have knowledge of the software requirements discipline and of the use case notation, however not everyone is aware that with the progress of ...
Roger Johnson, George Roussos, Luca Vetti Tagliati