Sciweavers

1804 search results - page 89 / 361
» Use Cases in Model-Driven Software Engineering
Sort
View
ESSOS
2011
Springer
14 years 7 months ago
An Architecture-Centric Approach to Detecting Security Patterns in Software
Abstract. Today, software security is an issue with increasing importance. Developers, software designers, end users, and enterprises have their own needs w.r.t. software security....
Michaela Bunke, Karsten Sohr
RE
2005
Springer
15 years 9 months ago
Personal and Contextual Requirements Engineering
A framework for requirements analysis is proposed that accounts for individual and personal goals, and the effect of time and context on personal requirements. The implications of...
Alistair G. Sutcliffe, Stephen Fickas, McKay Moore...
RE
2006
Springer
15 years 3 months ago
Using trust assumptions with security requirements
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, ...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
ICST
2008
IEEE
15 years 10 months ago
Empirical Software Change Impact Analysis using Singular Value Decomposition
Verification and validation techniques often generate various forms of software development artifacts. Change records created from verification and validation efforts show how fil...
Mark Sherriff, Laurie Williams
RE
2002
Springer
15 years 3 months ago
Relating Software Requirements and Architectures Using Problem Frames
Problem frames provide a means of analyzing and decomposing problems. They emphasise the world outside of the computer, helping the developer to focus on the problem domain, inste...
Jon G. Hall, Michael Jackson, Robin C. Laney, Bash...