메뉴 건너뛰기




Volumn , Issue , 2009, Pages 75-84

Capturing, organizing, and reusing knowledge of NFRs: An NFR pattern approach

Author keywords

[No Author keywords available]

Indexed keywords

BODY OF KNOWLEDGE; CAUSAL ATTRIBUTIONS; CREDIT CARDS; EXAMPLE BASED; MITIGATION TECHNIQUES; NON-FUNCTIONAL REQUIREMENTS; SECURITY STANDARDS;

EID: 77953198653     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MARK.2009.2     Document Type: Conference Paper
Times cited : (7)

References (39)
  • 3
    • 24344499838 scopus 로고    scopus 로고
    • Architectural patterns for problem frames
    • C. Choppy, D. Hatebur, and M. Heisel, "Architectural patterns for problem frames", IEE Proceedings-Software, 152(4), pp. 198-208, 2005
    • (2005) IEE Proceedings-Software , vol.152 , Issue.4 , pp. 198-208
    • Choppy, C.1    Hatebur, D.2    Heisel, M.3
  • 10
    • 33744905133 scopus 로고    scopus 로고
    • A pattern language for security models
    • E. Fernandez and R. Pan, "A pattern language for security models", PLoP 2001
    • (2001) PLoP
    • Fernandez, E.1    Pan, R.2
  • 14
    • 84976826756 scopus 로고
    • Semantic Database Modelling: Survey, applications and research issues
    • R. Hull and R. King, "Semantic Database Modelling: Survey, applications and research issues", ACM Computing Surveys, 19(3), pp. 202-260, 1987
    • (1987) ACM Computing Surveys , vol.19 , Issue.3 , pp. 202-260
    • Hull, R.1    King, R.2
  • 17
    • 33644536246 scopus 로고    scopus 로고
    • Organizational patterns for early requirements analysis
    • Springer
    • Kolp, M. and Giorgini, P. and Mylopoulos, J., "Organizational patterns for early requirements analysis", LNCS, pp. 617-632, Springer, 2003
    • (2003) LNCS , pp. 617-632
    • Kolp, M.1    Giorgini, P.2    Mylopoulos, J.3
  • 19
    • 0003026194 scopus 로고    scopus 로고
    • From non-functional requirements to design through patterns
    • Springer
    • D. Gross and E. Yu, "From non-functional requirements to design through patterns", Requirements Engineering, 6(1), pp. 18-36, Springer, 2001
    • (2001) Requirements Engineering , vol.6 , Issue.1 , pp. 18-36
    • Gross, D.1    Yu, E.2
  • 22
    • 79952766482 scopus 로고    scopus 로고
    • S. Hilley (editor), Elsevier, Apr.
    • S. Hilley (editor), Computer Fraud and Security, Elsevier, Apr. 2007
    • (2007) Computer Fraud and Security
  • 25
    • 17744386105 scopus 로고    scopus 로고
    • From System Goals to Intruder Anti-Goals: Attack Generation and Resolution for Security Requirements Engineering
    • A. van Lamsweerde, S. Brohez, R. De Landtsheer, and D. Janssens, "From System Goals to Intruder Anti-Goals: Attack Generation and Resolution for Security Requirements Engineering", Proc. of RHAS at RE'03, 3:49-56, 2003.
    • (2003) Proc. of RHAS at RE'03 , vol.3 , pp. 49-56
    • Van Lamsweerde, A.1    Brohez, S.2    De Landtsheer, R.3    Janssens, D.4
  • 27
    • 0026397113 scopus 로고
    • Questions, options, and criteria: Elements of design space analysis
    • Taylor & Francis
    • MacLean, A. and Young, R.M. and Bellotti, V.M.E. and Moran, T.P., "Questions, options, and criteria: Elements of design space analysis", Human-Computer Interaction, 6(3), pp. 201-250, Taylor & Francis, 1991
    • (1991) Human-Computer Interaction , vol.6 , Issue.3 , pp. 201-250
    • MacLean, A.1    Young, R.M.2    Bellotti, V.M.E.3    Moran, T.P.4
  • 28
    • 29544451645 scopus 로고    scopus 로고
    • Generating requirements from systems models using patterns: A case study
    • Springer
    • N.A.M. Maiden, S. Manning, S. Jones, and J. Greenwood, "Generating requirements from systems models using patterns: a case study", Requirements Engineering, 10(4), pp 276-288, 2005, Springer
    • (2005) Requirements Engineering , vol.10 , Issue.4 , pp. 276-288
    • Maiden, N.A.M.1    Manning, S.2    Jones, S.3    Greenwood, J.4
  • 29
    • 77953177867 scopus 로고    scopus 로고
    • A pattern language for pattern writing
    • G. Meszaros and J. Doble, "A pattern language for pattern writing", PLoP95
    • PLoP95
    • Meszaros, G.1    Doble, J.2
  • 30
    • 77953180892 scopus 로고    scopus 로고
    • Office Of The Privacy Commissioner Of Canada And Office Of The Information And Privacy Commissioner Of Alberta, Report of an Investigation into the Security, Collection and Retention of Personal Information of TJX Companies Inc. and Winners Merchant International L.P., Sep. 24, 2007
    • Office Of The Privacy Commissioner Of Canada And Office Of The Information And Privacy Commissioner Of Alberta, Report of an Investigation into the Security, Collection and Retention of Personal Information of TJX Companies Inc. and Winners Merchant International L.P., Sep. 24, 2007
  • 31
    • 77953218797 scopus 로고    scopus 로고
    • Payment Card Industry, v 1.1
    • Payment Card Industry, "Data Security Standard v 1.1", 2005
    • (2005) Data Security Standard
  • 32
    • 70450256774 scopus 로고    scopus 로고
    • Breaking the Code: How Credit-Card Data Went Out Wireless Door
    • May 4
    • J. Pereira, "Breaking The Code: How Credit-Card Data Went Out Wireless Door", The Wall Street Journal, May 4, 2007
    • (2007) The Wall Street Journal
    • Pereira, J.1
  • 34
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • G. Sindre and A. L. Opdahl. Eliciting security requirements with misuse cases. Requirements Engineering, 10:34-44, 2005.
    • (2005) Requirements Engineering , vol.10 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 38
    • 0035438855 scopus 로고    scopus 로고
    • Observations on using genetic algorithms for dynamic load-balancing
    • A.Y. Zomaya, and Y.H. Teh, "Observations on using genetic algorithms for dynamic load-balancing", IEEE Trans. on Parallel and Dist. Systems, pp. 899-911, 2001
    • (2001) IEEE Trans. on Parallel and Dist. Systems , pp. 899-911
    • Zomaya, A.Y.1    Teh, Y.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.