Sciweavers

2741 search results - page 44 / 549
» Designing Law-Compliant Software Requirements
Sort
View
ICSE
1994
IEEE-ACM
15 years 1 months ago
Lessons from Using Basic LOTOS
We describe three case studies in the use of Basic LOTOS. The studies cover design recovery, requirements speci cation, and design activities. We also report lessons learned from ...
Mark A. Ardis
ITCC
2005
IEEE
15 years 3 months ago
Misuse Case-Based Design and Analysis of Secure Software Architecture
This paper presents an approach to the architectural design and analysis of secure software systems based on the system requirements elicited in the form of use cases and misuse c...
Joshua J. Pauli, Dianxiang Xu
AOSD
2004
ACM
15 years 3 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
SEKE
2004
Springer
15 years 3 months ago
Supporting the Requirements Prioritization Process. A Machine Learning approach
Requirements prioritization plays a key role in the requirements engineering process, in particular with respect to critical tasks such as requirements negotiation and software re...
Paolo Avesani, Cinzia Bazzanella, Anna Perini, Ang...
67
Voted
ICSE
2005
IEEE-ACM
15 years 10 months ago
Clinical requirements engineering
In this paper, I make a case for integration of requirements engineering (RE) with clinical disciplines. To back my case, I look at two examples that employ a clinical RE approach...
Stephen Fickas