Sciweavers

674 search results - page 9 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
AISM
2004
13 years 10 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria
UML
2005
Springer
14 years 2 months ago
Specifying Precise Use Cases with Use Case Charts
Use cases are a popular method for capturing and structuring software requirements. The informality of use cases is both a blessing and a curse. It enables easy application and lea...
Jon Whittle
RE
2010
Springer
13 years 3 months ago
From Requirements Documents to System Models: A Tool for Interactive Semi-Automatic Translation
Natural language is the main presentation means in industrial requirements documents. This leads to the fact that requirements documents are often incomplete and inconsistent. Desp...
Leonid Kof
ER
2009
Springer
79views Database» more  ER 2009»
14 years 3 months ago
Modeling Domain Variability in Requirements Engineering with Contexts
Various characteristics of the problem domain define the context in which the system is to operate and thus impact heavily on its requirements. However, most requirements specifica...
Alexei Lapouchnian, John Mylopoulos
APN
2008
Springer
13 years 11 months ago
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
Abstract. In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authent...
Roland Bouroulet, Raymond R. Devillers, Hanna Klau...