Compliance with privacy legislation is a primary concern for health care institutions that are building information systems support for their business processes. This paper descri...
Formal methods are a nice idea, but the size and complexity of real systems means that they are impractical. We propose that a reasonable alternative to attempting to specify and ...
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Transforming a text-based clinical guideline in a computer-interpretable form is a time-consuming and demanding task due to the various users involved, who have different technica...
—It is well known that requirements engineering plays a critical role in software quality. The use case approach is a requirements elicitation technique commonly used in industri...