-
1
-
-
84949042867
-
-
Spanish Royal Decree 994/1999 June 11th, by means of which the Security Measures Regulations of Automated Files which contain personal data is approved 25/06/1999 (In Spanish)
-
Spanish Royal Decree 994/1999, June 11th, by means of which the Security Measures Regulations of Automated Files which contain personal data is approved. BOE no. 151, 25/06/1999, page 24241 (In Spanish)
-
BOE
, Issue.151
, pp. 24241
-
-
-
2
-
-
84949042868
-
-
Spanish Constitutional Law 15/ December 13th, on Personal Data Protection 14/12/1999 (In Spanish)
-
Spanish Constitutional Law 15/1999, December 13th, on Personal Data Protection. BOE no. 298, 14/12/1999 (In Spanish)
-
(1999)
BOE
, Issue.298
-
-
-
3
-
-
84949042869
-
Directive 95/46/CE of the European Parliament and Council, dated October 24th: About People protection regarding the personal data management and the free circulation of these data
-
Directive 95/46/CE of the European Parliament and Council, dated October 24th: about People protection regarding the personal data management and the free circulation of these data. DOCE no. L281, 23/11/1995, P.0031-0050
-
(1995)
DOCE No L281, 23/11/
, pp. 0031-0050
-
-
-
4
-
-
84948976768
-
-
Software Engineering Standards Committee of the IEEE Computer Society: IEEE Guide for Developing System Requirements Specifications
-
Software Engineering Standards Committee of the IEEE Computer Society: IEEE Guide for Developing System Requirements Specifications. IEEE Std. 1233-1998
-
IEEE Std. 1233-1998
-
-
-
5
-
-
84948992476
-
-
Software Engineering Standards Committee of the IEEE Computer Society: IEEE Recommended Practice for Software Requirements Specifications
-
Software Engineering Standards Committee of the IEEE Computer Society: IEEE Recommended Practice for Software Requirements Specifications. IEEE Std 830-1998
-
IEEE Std 830-1998
-
-
-
6
-
-
2642514289
-
-
Software Engineering Standards Committee of the IEEE Computer Society: IEEE Standard Glossary of Software Engineering Terminology
-
Software Engineering Standards Committee of the IEEE Computer Society: IEEE Standard Glossary of Software Engineering Terminology. IEEE Std 610.12-1990
-
IEEE Std 610.12-1990
-
-
-
7
-
-
84949042870
-
-
Spanish Ministry of Public Administration. Information System Risk Analysis and Management Methodology. (Spanish)
-
Spanish Ministry of Public Administration: MAGERIT Version 1.0. Information System Risk Analysis and Management Methodology. 1996 (In Spanish)
-
(1996)
MAGERIT Version 1.0
-
-
-
8
-
-
84949042871
-
-
Requisite Pro. Rational Software
-
Requisite Pro. Rational Software. http://www.rational.com
-
-
-
-
9
-
-
4243694529
-
-
INCOSE prepared by Requirements Working Group of the Int. Council on Systems Engineering
-
Pradip Kar, Michelle Bailey: Characteristics of Good Requirements. INCOSE 1996, prepared by Requirements Working Group of the Int. Council on Systems Engineering
-
(1996)
Characteristics of Good Requirements
-
-
Kar, P.1
Bailey, M.2
-
10
-
-
0000292519
-
Dep. of computer science, university of hertfordshire and rolls-royce university technology center, dep. of computer science, the university of York
-
W.Lam, J.A. McDermid, A.J.Vickers: Dep. of Computer Science, University of Hertfordshire and Rolls-Royce University Technology Center, Dep. of Computer Science, The University of York. Ten Steps Towards Systematic Requirements Reuse. Requirements Eng (1997) 2: 102-113
-
(1997)
Ten Steps Towards Systematic Requirements Reuse. Requirements Eng
, vol.2
, pp. 102-113
-
-
Lam, W.1
McDermid, J.A.2
Vickers, A.J.3
-
11
-
-
84949042872
-
Wilson: Writing effective natural language requirements specifications
-
Feb 99. STSC
-
William M. Wilson: Writing Effective Natural Language Requirements Specifications. Feb 99. Crosstalk. The Journal of Defense Software Engineering. STSC. http://www.stsc.hill.af.mil/crossTalk/1999/feb/wilson.asp
-
Crosstalk. The Journal of Defense Software Engineering
-
-
William, M.1
-
12
-
-
33645011687
-
Strategic drivers of software quality: Beyond external and internal software quality
-
Fitzpatrick, R. Strategic Drivers of Software Quality: Beyond External and Internal Software Quality. Proc. of the AQAPS Int. Conf.. IEEE Comp. Society, 65-72, 2001.
-
(2001)
Proc. of the AQAPS Int. Conf. IEEE Comp. Society
, pp. 65-72
-
-
Fitzpatrick, R.1
-
13
-
-
84937400267
-
Towards use case and conceptual models through business modeling
-
Laender, A.H.F., Liddle, S.W., Storey, V.C. eds., Springer-Verlag
-
García, J., Ortín M. J., Moros, B. Nicolás, J. and Toval, A.: Towards Use Case and Conceptual Models through Business Modeling. Laender, A.H.F., Liddle, S.W., Storey, V.C. (eds.): Conceptual Modeling-ER 2000. Lec. Notes in Comp. Sci., Vol. 1920, . Springer-Verlag (2000) 281-294
-
(2000)
Conceptual Modeling-ER 2000. Lec. Notes in Comp. Sci.
, vol.1920
, pp. 281-294
-
-
García, J.1
Ortín, M.J.2
Moros, B.3
Nicolás, J.4
Toval, A.5
-
16
-
-
21544431902
-
Formal validation and verification of atomic resolution microscope control and topography
-
December
-
Nicolás, J.; Toval, A.; Arenas, A. and Alcalde, J., Formal Validation and Verification of Atomic Resolution Microscope Control and Topography, Cybernetics and Systems, Volume 32, Number 8, December 2001
-
(2001)
Cybernetics and Systems
, vol.32
, Issue.8
-
-
Nicolás, J.1
Toval, A.2
Arenas, A.3
Alcalde, J.4
-
18
-
-
0031385980
-
Classification of research efforts in requirements engineering ACM
-
Zave, P.: Classification of Research Efforts in Requirements Engineering, ACM Computing Surveys, vol. 29, n. 4, pp. 315-321, 1997
-
(1997)
Computing Surveys
, vol.29
, Issue.4
, pp. 315-321
-
-
Zave, P.1
-
23
-
-
33746247912
-
Requirements classification and reuse: Crossing domain boundaries
-
Springer, Lecture Notes in Computer Science. Viena
-
Cybulsky JL, Reed K.: Requirements Classification and Reuse: Crossing Domain Boundaries. In: 6th Int. Conf. on Software Reuse, ICSR'2000. Springer, Lecture Notes in Computer Science. Viena. 2000
-
(2000)
6th Int. Conf. on Software Reuse, ICSR'2000
-
-
Cybulsky, J.L.1
Reed, K.2
-
26
-
-
0028012990
-
An analysis of the requirements traceability problem
-
Colorado Springs Co, 1994, IEEE Computer Society Press
-
Gotel, O. and Finkelstein, A.W.: An Analysis of the requirements traceability problem. Proceedings of the Int. Conf. on Requirements Engineering, Colorado Springs Co, 1994, IEEE Computer Society Press, pp. 94-102
-
Proceedings of the Int. Conf. on Requirements Engineering
, pp. 94-102
-
-
Gotel, O.1
Finkelstein, A.W.2
-
27
-
-
84956602782
-
Analyzing software requirements errors in safetycritical embedded systems
-
San Diego, CA
-
Lutz R.: Analyzing software requirements errors in safetycritical embedded systems. Proceedings of RE'93, San Diego, CA, pp. 126-33
-
Proceedings of RE'93
, pp. 126-133
-
-
Lutz, R.1
-
28
-
-
84979855000
-
Dealing with security requirements during the development of information systems
-
Rolland C, Bodat F. and Cauvet C. (eds.) Berlin: Springer Verlag. Paris
-
Chung L.: Dealing with Security Requirements during the development of Information Systems. In: Rolland C, Bodat F. and Cauvet C. (eds.). Advanced Information Systems Eng., Proc., 5th Int. Conf. CAiSE '93. Berlin: Springer Verlag. Paris. 1993. pp. 234-251
-
(1993)
Advanced Information Systems Eng., Proc., 5th Int. Conf. CAiSE '93
, pp. 234-251
-
-
Chung, L.1
-
29
-
-
84949042875
-
The role of requirement reuse in protecting personal data
-
Computer Science and Engineering: Part I, ("Database Security invited session") Orlando, Florida (USA), July
-
Toval, A., Olmos, A., Rodero, J.A. "The Role of Requirement Reuse in Protecting Personal Data", Proc. of the 5th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2001), Vol. VII, Computer Science and Engineering: Part I, ("Database Security invited session") Orlando, Florida (USA), July 2001.
-
(2001)
Proc. of the 5th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2001)
, vol.7
-
-
Toval, A.1
Olmos, A.2
Rodero, J.A.3
-
30
-
-
17844409254
-
Requirements reuse for improving information systems security: A practicioner's approach
-
Springer-Verlag
-
Toval, A., Nicolás, J., Moros, B., García F., Requirements Reuse for Improving Information Systems Security: A Practicioner's Approach, Requirements Engineering Journal, vol. 6, n. 4, pp. 205-219, 2002 Springer-Verlag.
-
(2002)
Requirements Engineering Journal
, vol.6
, Issue.4
, pp. 205-219
-
-
Toval, A.1
Nicolás, J.2
Moros, B.3
García, F.4
-
31
-
-
0034826451
-
The hidden meta-requirements of security and privacy (keynote talk)
-
August, 27-31 Toronto, Canada
-
Gene Spafford.The Hidden Meta-Requirements of Security and Privacy (keynote talk). Procs. of the Fifth IEEE Int. Sym. on Requirements Engineering, August, 27-31, 2001, Toronto, Canada.
-
(2001)
Procs. of the Fifth IEEE Int. Sym. on Requirements Engineering
-
-
Gene, S.1
-
32
-
-
0034835859
-
The role of policy and stakeholder privacy values in requirements engineering
-
August, 27-31, Toronto, Canada
-
Annie I. Antón, Julia B. Earp, Colin Potts and Thomas A. Alspaugh. The Role of Policy and Stakeholder Privacy Values in Requirements Engineering. Proc. of the Fifth IEEE Int. Sym. on Requirements Engineering, August, 27-31, 2001, Toronto, Canada.
-
(2001)
Proc. of the Fifth IEEE Int. Sym. on Requirements Engineering
-
-
Antón, A.I.1
Earp, J.B.2
Potts, C.3
Alspaugh, T.A.4
-
33
-
-
0036149234
-
Correctness by construction: Developing a commercial secure system
-
Jan/Feb
-
Hall, Anthony and Chapman, Roderick. Correctness by Construction: Developing a Commercial Secure System. IEEE Software Jan/Feb 2002, pp. 18-25
-
(2002)
IEEE Software
, pp. 18-25
-
-
Hall, A.1
Chapman, R.2
-
34
-
-
0036145519
-
Building software securely from the ground up
-
Jan/Feb
-
Ghosh, Anup K. Howell, Chuck. Whittaker, James A. Building Software Securely from the Ground Up. IEEE Software Jan/Feb 2002, pp. 14-16
-
(2002)
IEEE Software
, pp. 14-16
-
-
Ghosh, A.K.1
Howell, C.2
Whittaker, J.A.3
|