-
1
-
-
0037240812
-
Misuse cases: Use cases with hostile intent
-
Jan.Feb
-
I. Alexander. Misuse cases: Use cases with hostile intent. IEEE Software, pages 58-66, Jan.Feb. 2003.
-
(2003)
IEEE Software
, pp. 58-66
-
-
Alexander, I.1
-
5
-
-
33745127388
-
Software Engineering Research and Applications (SERA2004)- LNCS
-
L. Chung and S. Supakkul. Representing NFRs and FRs: A goal-oriented and use case driven approach. Software Engineering Research and Applications (SERA2004)- LNCS, 3647(29-41), 2005.
-
(2005)
, vol.3647
, Issue.29-41
-
-
Chung, L.1
Supakkul, S.2
-
7
-
-
0032641691
-
Background to qualitative decision theory
-
January
-
J. Doyle and R. Thomason. Background to qualitative decision theory. AI Magazine, 20(1), January 1999.
-
(1999)
AI Magazine
, vol.20
, Issue.1
-
-
Doyle, J.1
Thomason, R.2
-
8
-
-
15944398393
-
A software fault tree approach to requirements analysis
-
G. Helmer, J. Wong, M. Slagell, V. Honavar, L. Miller, and R. Lutz. A software fault tree approach to requirements analysis. Requirements Engineering, 7:207-220, 2002.
-
(2002)
Requirements Engineering
, vol.7
, pp. 207-220
-
-
Helmer, G.1
Wong, J.2
Slagell, M.3
Honavar, V.4
Miller, L.5
Lutz, R.6
-
10
-
-
0022730231
-
Software safety: Why, what, and how
-
June
-
N. Leveson. Software safety: Why, what, and how. ACM Computing Surveys, 18(2), June 1986.
-
(1986)
ACM Computing Surveys
, vol.18
, Issue.2
-
-
Leveson, N.1
-
11
-
-
84942929509
-
Introducing abuse frames for analysing security requirements
-
L. Lin, B. Nuseibeh, D. Ince, M. Jackson, and J. Moffett. Introducing abuse frames for analysing security requirements. In Proc. Intl. Requirements Engineering Conference, 2003.
-
(2003)
Proc. Intl. Requirements Engineering Conference
-
-
Lin, L.1
Nuseibeh, B.2
Ince, D.3
Jackson, M.4
Moffett, J.5
-
14
-
-
0026883734
-
Representing and using nonfunctional requirements: A process-oriented approach
-
J. Mylopoulos, L. Chung, and B. A. Nixon. Representing and using nonfunctional requirements: A process-oriented approach. IEEE Transactions on Software Engineering, 18(6):483-497, 1992.
-
(1992)
IEEE Transactions on Software Engineering
, vol.18
, Issue.6
, pp. 483-497
-
-
Mylopoulos, J.1
Chung, L.2
Nixon, B.A.3
-
15
-
-
0010920417
-
From object-oriented to goal-oriented requirements analysis
-
J. Mylopoulos, L. Chung, and E. Yu. From object-oriented to goal-oriented requirements analysis. Communications of the ACM, 42(1):31-37, 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.1
, pp. 31-37
-
-
Mylopoulos, J.1
Chung, L.2
Yu, E.3
-
18
-
-
13644252644
-
Eliciting secutiry requirements with misuse cases
-
G. Sindre and A. L. Opdahl. Eliciting secutiry requirements with misuse cases. Requirements Engineering, 10:34-44, 2005.
-
(2005)
Requirements Engineering
, vol.10
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
|