Sciweavers

7475 search results - page 29 / 1495
» Supporting use case based requirements engineering
Sort
View
ICSE
2004
IEEE-ACM
15 years 12 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
CAISE
2006
Springer
15 years 3 months ago
Designing Security Requirements Models Through Planning
The quest for designing secure and trusted software has led to refined Software Engineering methodologies that rely on tools to support the design process. Automated reasoning mech...
Volha Bryl, Fabio Massacci, John Mylopoulos, Nicol...
ICSE
2001
IEEE-ACM
15 years 4 months ago
Applying WinWin to Quality Requirements: A Case Study
This paper describes the application of the WinWin paradigm to identify and resolve conflicts in a series of real-client, student-developer digital library projects. The paper is ...
Hoh In, Barry W. Boehm, Thomas Lee Rodgers, Michae...
IWPSE
2010
IEEE
14 years 9 months ago
An automated hint generation approach for supporting the evolution of requirements specifications
Updating the requirements specification during software evolution is a manual and expensive task. Therefore, software engineers usually choose to apply modifications directly to t...
Eya Ben Charrada, Martin Glinz
ISSRE
2010
IEEE
14 years 10 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...