Sciweavers

10670 search results - page 84 / 2134
» Required Information Release
Sort
View
QSIC
2006
IEEE
15 years 7 months ago
PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application
Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for the system before they use the syst...
Haruhiko Kaiya, Kouta Sasaki, Kenji Kaijiri
AOSE
2005
Springer
15 years 7 months ago
Requirements Elicitation for Agent-Based Applications
Requirements elicitation for a software system is a key stage in a successful development. At the same time, it is one of the most challenging, because requirements have to conside...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...
109
Voted
RE
2008
Springer
15 years 1 months ago
A Case Study in Eliciting Scalability Requirements
Scalability is widely recognized as an important software quality, but it is a quality that historically has lacked a consistent and systematic treatment. To address this problem,...
Leticia Duboc, Emmanuel Letier, David S. Rosenblum...
SDMW
2007
Springer
15 years 8 months ago
Requirements of Secure Storage Systems for Healthcare Records
Recent compliance regulations are intended to foster and restore human trust in digital information records and, more broadly, in our businesses, hospitals, and educational enterpr...
Ragib Hasan, Marianne Winslett, Radu Sion
WER
2007
Springer
15 years 8 months ago
Role-Based Access Control Requirements Model with Purpose Extension
Role-Based Access Control (RBAC) is increasingly used for ensuring security and privacy in complex organizations such as healthcare institutions. In RBAC, access permissions are g...
Faranak Farzad, Eric Yu, Patrick C. K. Hung