Sciweavers

2236 search results - page 266 / 448
» Secure Software Design in Practice
Sort
View
SIGSOFT
2009
ACM
16 years 3 months ago
Synthesizing partial component-level behavior models from system specifications
Initial system specifications, such as use-case scenarios and properties, only partially specify the future system. We posit that synthesizing partial component-level behavior mod...
Ivo Krka, Yuriy Brun, George Edwards, Nenad Medvid...
EUROMICRO
2007
IEEE
15 years 9 months ago
Scope Management of Non-Functional Requirements
Getting business stakeholders’ goals formulated clearly and project scope defined realistically increases the chance of success for any application development process. As a cons...
Mohamad Kassab, Maya Daneva, Olga Ormandjieva
ICSE
2005
IEEE-ACM
15 years 8 months ago
Observations and lessons learned from automated testing
This report addresses some of our observations made in a dozen of projects in the area of software testing, and more specifically, in automated testing. It documents, analyzes and...
Stefan Berner, Roland Weber, Rudolf K. Keller
EDBTW
2010
Springer
15 years 10 months ago
Collaborative data privacy for the web
While data privacy is a human right, it is challenging to enforce it. For example, if multiple retailers execute a single order at Amazon Marketplace, each retailer can use diffe...
Clemens Heidinger, Erik Buchmann, Klemens Böh...
RE
2002
Springer
15 years 2 months ago
Exploring the Relationship between Project Selection and Requirements Analysis: An Empirical Study of the New Millennium Program
The relationship between project selection and requirements analysis is important, yet has not received much attention. The decisions made during project selection directly affect...
Mark Bergman, Gloria Mark