Sciweavers

1432 search results - page 11 / 287
» Executable Protocol Models as a Requirements Engineering Too...
Sort
View
EUROSYS
2007
ACM
15 years 1 months ago
Discrete control for safe execution of IT automation workflows
As information technology (IT) administration becomes increasingly complex, workflow technologies are gaining popularity for IT automation. Writing correct workflow programs is no...
Yin Wang, Terence Kelly, Stéphane Lafortune
EUROSPI
2005
Springer
15 years 3 months ago
Goal-Driven Requirements Engineering for Supporting the ISO 15504 Assessment Process
It is advocated to use the ISO/IEC 15504 standard into new domains not related to Information Technology (IT), giving a powerful enterprise-wide assessment tool for quality manager...
André Rifaut
ASE
2008
120views more  ASE 2008»
14 years 9 months ago
Requirements model generation to support requirements elicitation: the Secure Tropos experience
In the last years several efforts have been devoted by researchers in the Requirements Engineering community to the development of methodologies for supporting designers during req...
Nadzeya Kiyavitskaya, Nicola Zannone
SIGSOFT
2005
ACM
15 years 10 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
WER
1998
Springer
15 years 1 months ago
Towards Requirements Engineering of Active Database Systems
Active systems are emerging in many fields, being particularly interesting those like Active Database Management Systems which always provide some kind of reactive capabilities. I...
José Hilario Canós Cerdá, Jav...