Sciweavers

44 search results - page 2 / 9
» Requirements Reuse for Improving Information Systems Securit...
Sort
View
CAD
2005
Springer
13 years 5 months ago
Configurable product views based on geometry user requirements
This paper describes an approach at Volvo Truck Corporation where geometry users' requirements are utilised to define configurable product views. The paper is derived from a ...
Freddy Fuxin
CAISE
2009
Springer
13 years 12 months ago
Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects
In CAiSE 2006, we had presented a framework to support development of secure information systems. The framework was based on the integration of two security-aware approaches, the S...
Haralambos Mouratidis, Ali Sunyaev, Jan Jürje...
ISSRE
2010
IEEE
13 years 3 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...
ISTAR
2008
13 years 6 months ago
Improving the Syntax and Semantics of Goal Modelling Languages
One major obstacle to requirements engineering (RE) is the growing complexity of today's systems. Such a complexity can only be fficiently by powerful abstraction mechanisms a...
Raimundas Matulevicius
IJISTA
2010
109views more  IJISTA 2010»
13 years 3 months ago
BKCAS: a distributed context-aware pervasive information system to support user roaming
- Over the last few years, Pervasive Computing has become a very active research topic in both academia and industry. In spite of its undeniable benefit, until recently, the wide d...
Nguyen Chan Hung, Vu Thanh Vinh, Nguyen Huu Thang,...