There are many different approaches to elicit requirements each having its strengths and weaknesses. Hence, some approaches may be ore suitable to one domain then another. Moreove...
In CAiSE 2006, we had presented a framework to support development of secure information systems. The framework was based on the integration of two security-aware approaches, the S...
This paper presents a brief initial look at some of the possible benefits and barriers to using OWL as the language for the development, dissemination and implementation of termin...
The focus of this work is the requirements engineering process in the home care domain. The overall aim is to design and document a flexible methodology to facilitate the elicitat...
Given the widespread intimidation state of affairs, there is a gripping want to enlarge architectures, algorithms, and protocols to apprehend a trustworthy network infrastructure....