-
1
-
-
27644493412
-
Facing scalability issues in requirements prioritization with machine learning techniques
-
Aug.-2 Sept.
-
P. Avesani, C. Bazzanella, A. Perini, and A. Susi. Facing scalability issues in requirements prioritization with machine learning techniques. 13th IEEE Intl. Conf. on Req. Eng., pp 297-305, Aug.-2 Sept. 2005.
-
(2005)
13th IEEE Intl. Conf. on Req. Eng.
, pp. 297-305
-
-
Avesani, P.1
Bazzanella, C.2
Perini, A.3
Susi, A.4
-
2
-
-
33751063543
-
Privacy and Contextual Integrity: Framework and Applications
-
A. Barth, A. Datta, J. C. Mitchell, and H. Nissenbaum, "Privacy and Contextual Integrity: Framework and Applications," Proc. of the 2006 IEEE Symposium on Security and Privacy, pp.184-198, 2006.
-
(2006)
Proc. of the 2006 IEEE Symposium on Security and Privacy
, pp. 184-198
-
-
Barth, A.1
Datta, A.2
Mitchell, J.C.3
Nissenbaum, H.4
-
5
-
-
40449096076
-
Analyzing Regulatory Rules for Privacy and Security Requirements
-
Jan.
-
T. D. Breaux and A. I. Antón, "Analyzing Regulatory Rules for Privacy and Security Requirements," IEEE Trans. on Soft. Eng., 34(1), pp. 5-20, Jan. 2008.
-
(2008)
IEEE Trans. on Soft. Eng.
, vol.34
, Issue.1
, pp. 5-20
-
-
Breaux, T.D.1
Antón, A.I.2
-
6
-
-
38149018837
-
Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations
-
Sept.
-
T. D. Breaux, M. W. Vail, and A. I. Antón, "Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations," 14th IEEE Intl. Req. Eng. Conf. pp. 49-58, Sept. 2006.
-
(2006)
14th IEEE Intl. Req. Eng. Conf.
, pp. 49-58
-
-
Breaux, T.D.1
Vail, M.W.2
Antón, A.I.3
-
9
-
-
58049164377
-
Requirements prioritization based on benefit and cost prediction: An agenda for future research
-
Sept.
-
A. Herrmann and M. Daneva. Requirements prioritization based on benefit and cost prediction: An agenda for future research. 16th IEEE Intl. Req. Eng., Sept. 2008.
-
(2008)
16th IEEE Intl. Req. Eng.
-
-
Herrmann, A.1
Daneva, M.2
-
10
-
-
0041307366
-
-
Licentiate Thesis 513, Department of Computer and Information Science, Linköping University, Sweden
-
J. Karlsson. Towards a Strategy for Software Requirements Selection. Licentiate Thesis 513, Department of Computer and Information Science, Linköping University, Sweden, 1995.
-
(1995)
Towards a Strategy for Software Requirements Selection
-
-
Karlsson, J.1
-
11
-
-
0029705074
-
Software requirements prioritizing
-
Apr.
-
J. Karlsson. Software requirements prioritizing. 2nd Intl. Conf. on Req. Eng., pp. 110-116, Apr. 1996.
-
(1996)
2nd Intl. Conf. on Req. Eng.
, pp. 110-116
-
-
Karlsson, J.1
-
12
-
-
0031234218
-
A cost-value approach for prioritizing requirements
-
Sep/Oct
-
J. Karlsson and K. Ryan. A cost-value approach for prioritizing requirements. IEEE Software, 14(5):67-74, Sep/Oct 1997.
-
(1997)
IEEE Software
, vol.14
, Issue.5
, pp. 67-74
-
-
Karlsson, J.1
Ryan, K.2
-
15
-
-
77649102787
-
Obama: EHRs for Americans by 2014
-
January 8
-
D. Manos, Obama: EHRs for Americans by 2014. Healthcare IT News, January 8, 2009.
-
(2009)
Healthcare IT News
-
-
Manos, D.1
-
16
-
-
33947620690
-
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
-
M. J. May, C. A. Gunter, and I. Lee, "Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies," 19th IEEE Computer Security Foundations Workshop, pp. 85 - 97, 2006.
-
(2006)
19th IEEE Computer Security Foundations Workshop
, pp. 85-97
-
-
May, M.J.1
Gunter, C.A.2
Lee, I.3
-
17
-
-
17744386721
-
Using a Security Requirements Engineering Methodology in Practice: The Compliance with the Italian Data Protection Legislation
-
F. Massacci, M. Prest, and N. Zannone, "Using a Security Requirements Engineering Methodology in Practice: The Compliance with the Italian Data Protection Legislation," Computer Standards & Interfaces, 27(5), pp. 445-455, 2005.
-
(2005)
Computer Standards & Interfaces
, vol.27
, Issue.5
, pp. 445-455
-
-
Massacci, F.1
Prest, M.2
Zannone, N.3
-
18
-
-
77952962599
-
Evaluating Existing Security and Privacy Requirements for Legal Compliance
-
(In Press for) Springer Verlag
-
A. K. Massey, P. N. Otto, L. J. Hayward, and A. I. Antón, "Evaluating Existing Security and Privacy Requirements for Legal Compliance." (In Press for) Req. Eng. Journal, Springer Verlag, 2009.
-
(2009)
Req. Eng. Journal
-
-
Massey, A.K.1
Otto, P.N.2
Hayward, L.J.3
Antón, A.I.4
-
20
-
-
45849084997
-
Addressing Legal Requirements in Requirements Engineering
-
15-19 Oct.
-
Paul. N. Otto and Annie. I. Antón, "Addressing Legal Requirements in Requirements Engineering," 15th IEEE Intl. Req. Eng. Conf., pp. 5-14, 15-19 Oct. 2007.
-
(2007)
15th IEEE Intl. Req. Eng. Conf.
, pp. 5-14
-
-
Otto, P.N.1
Antón, A.I.2
-
23
-
-
77953006184
-
A big stimulus boost for electronic health records
-
February 20
-
E. Singer. A big stimulus boost for electronic health records. MIT Technology Review, February 20, 2009.
-
(2009)
MIT Technology Review
-
-
Singer, E.1
-
24
-
-
23044498039
-
Case Study Research: Design and Methods
-
Sage Publications, 3rd ed.
-
R. K. Yin, Case Study Research: Design and Methods, vol. 5 of Applied Social Research Methods Series. Sage Publications, 3rd ed., 2003.
-
(2003)
Applied Social Research Methods Series
, vol.5
-
-
Yin, R.K.1
|