Sciweavers

137 search results - page 9 / 28
» Requirements engineering for trust management: model, method...
Sort
View
CCS
2009
ACM
15 years 8 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
WIRTSCHAFTSINFORMATI
2003
15 years 2 months ago
Using Management Objectives to Specify Management Information Systems - A Contribution to MIS Success
: Data warehouse projects, today, are in an ambivalent situation. On the one hand, data warehouses are critical for a company's success and various methodological and technolo...
Jörg Becker, Alexander Dreiling, Michael Ribb...
JSW
2008
106views more  JSW 2008»
15 years 1 months ago
Factors that Significantly Impact the Implementation of an Agile Software Development Methodology
The Internet economy has altered the current rules of software engineering. Traditional development methodologies have proven too cumbersome to meet the rapidly changing requiremen...
Jeffrey A. Livermore
HICSS
2000
IEEE
133views Biometrics» more  HICSS 2000»
15 years 5 months ago
Value based Requirements Creation for Electronic Commerce Applications
Electronic commerce applications have special features compared to conventional information systems. First, because electronic commerce usually involves yet nonexisting business a...
Jaap Gordijn, Hans Akkermans, Hans van Vliet
SLE
2009
Springer
15 years 5 months ago
Multi-view Composition Language for Software Product Line Requirements
Composition of requirements models in Software Product Line (SPL) development enables stakeholders to derive the requirements of target software products and, very important, to re...
Mauricio Alférez, João Santos, Ana M...