-
2
-
-
8844227504
-
A unified model of dependability: Capturing dependability in context
-
V. Basili, P. Donzelli, and S. Asgari. A unified model of dependability: Capturing dependability in context. IEEE Softw., 21(6):19-25, 2004.
-
(2004)
IEEE Softw.
, vol.21
, Issue.6
, pp. 19-25
-
-
Basili, V.1
Donzelli, P.2
Asgari, S.3
-
3
-
-
0024089511
-
Understanding and controlling software costs
-
October
-
B. W. Boehm and P. N. Papaccio. Understanding and controlling software costs. IEEE Trans. Softw. Eng., 14(10):1462-1477, October 1988.
-
(1988)
IEEE Trans. Softw. Eng.
, vol.14
, Issue.10
, pp. 1462-1477
-
-
Boehm, B.W.1
Papaccio, P.N.2
-
5
-
-
3042581036
-
Nonfunctional Requirements: From Elicitation to Conceptual Models
-
L. M. Cysneiros and J. C. S. do Prado Leite. Nonfunctional Requirements: From Elicitation to Conceptual Models. IEEE Trans. Softw. Eng., 30(5), 2004.
-
(2004)
IEEE Trans. Softw. Eng.
, vol.30
, Issue.5
-
-
Cysneiros, L.M.1
Do Prado Leite, J.C.S.2
-
6
-
-
78049485828
-
Software quality models: Purposes, usage scenarios and requirements
-
IEEE Computer Society
-
F. Deissenboeck, E. Juergens, K. Lochmann, and S. Wagner. Software quality models: Purposes, usage scenarios and requirements. In Proc. 7th International Workshop on Software Quality (WoSQ 09). IEEE Computer Society, 2009.
-
(2009)
Proc. 7th International Workshop on Software Quality (WoSQ 09)
-
-
Deissenboeck, F.1
Juergens, E.2
Lochmann, K.3
Wagner, S.4
-
7
-
-
47349098250
-
An activity-based quality model for maintainability
-
IEEE Computer Society
-
F. Deissenboeck, S. Wagner, M. Pizka, S. Teuchert, and J. F. Girard. An activity-based quality model for maintainability. In Proc. IEEE International Conference on Software Maintenance (ICSM 2007), pages 184-193. IEEE Computer Society, 2007.
-
(2007)
Proc. IEEE International Conference on Software Maintenance (ICSM 2007)
, pp. 184-193
-
-
Deissenboeck, F.1
Wagner, S.2
Pizka, M.3
Teuchert, S.4
Girard, J.F.5
-
8
-
-
27644594007
-
Non-functional requirements in industry - Three case studies adopting an experience-based NFR method
-
IEEE Computer Society
-
J. Doerr, D. Kerkow, T. Koenig, T. Olsson, and T. Suzuki. Non-functional requirements in industry - three case studies adopting an experience-based NFR method. In Proc. 13th International Conference on Requirements Engineering (RE'05), pages 373-382. IEEE Computer Society, 2005.
-
(2005)
Proc. 13th International Conference on Requirements Engineering (RE'05)
, pp. 373-382
-
-
Doerr, J.1
Kerkow, D.2
Koenig, T.3
Olsson, T.4
Suzuki, T.5
-
9
-
-
0031503094
-
Dealing with nonfunctional requirements in large software systems
-
C. Ebert. Dealing with Nonfunctional Requirements in Large Software Systems. Ann. Softw. Eng., 3:367-395, 1997. (Pubitemid 127429242)
-
(1997)
Annals of Software Engineering
, vol.3
, pp. 367-395
-
-
Ebert, C.1
-
10
-
-
77954617636
-
-
Federal Office for Information Security (BSI) in Germany
-
Federal Office for Information Security (BSI) in Germany. IT-Grundschutz Catalogues. https://www.bsi.bund.de/, 2007.
-
(2007)
IT-Grundschutz Catalogues
-
-
-
11
-
-
2942757657
-
Engineering security requirements
-
D. Firesmith. Engineering security requirements. Journal of Object Technology, 2(1):53-68, 2003.
-
(2003)
Journal of Object Technology
, vol.2
, Issue.1
, pp. 53-68
-
-
Firesmith, D.1
-
13
-
-
31044438063
-
Requirements abstraction model
-
T. Gorschek and C. Wohlin. Requirements abstraction model. Requir. Eng., 11(1):79-101, 2006.
-
(2006)
Requir. Eng.
, vol.11
, Issue.1
, pp. 79-101
-
-
Gorschek, T.1
Wohlin, C.2
-
14
-
-
40449096402
-
Security requirements engineering: A framework for representation and analysis
-
DOI 10.1109/TSE.2007.70754
-
C. B. Haley, R. C. Laney, J. D. Moffett, and B. Nuseibeh. Security requirements engineering: A framework for representation and analysis. IEEE Trans. Softw. Eng., 34(1):133-153, 2008. (Pubitemid 351343906)
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.1
, pp. 133-153
-
-
Haley, C.B.1
Laney, R.2
Moffett, J.D.3
Nuseibeh, B.4
-
16
-
-
0029779819
-
Software quality: The elusive target
-
B. Kitchenham and S. P. Pfleeger. Software quality: The elusive target. IEEE Softw., 13(1):12-21, 1996.
-
(1996)
IEEE Softw.
, vol.13
, Issue.1
, pp. 12-21
-
-
Kitchenham, B.1
Pfleeger, S.P.2
-
17
-
-
33751416458
-
A common criteria based security requirements engineering process for the development of secure information systems
-
D. Mellado, E. Fernandez-Medina, and M. Piattini. A common criteria based security requirements engineering process for the development of secure information systems. Computer Standards & Interfaces, 29(2):244-253, 2007.
-
(2007)
Computer Standards & Interfaces
, vol.29
, Issue.2
, pp. 244-253
-
-
Mellado, D.1
Fernandez-Medina, E.2
Piattini, M.3
-
18
-
-
49049105507
-
Security requirements variability for software product lines
-
IEEE Computer Society
-
D. Mellado, E. F. Medina, and M. Piattini. Security requirements variability for software product lines. In Proc. Third International Conference on Availability, Reliability and Security (ARES '08), pages 1413-1420. IEEE Computer Society, 2008.
-
(2008)
Proc. Third International Conference on Availability, Reliability and Security (ARES '08)
, pp. 1413-1420
-
-
Mellado, D.1
Medina, E.F.2
Piattini, M.3
-
19
-
-
0026883734
-
Representing and using nonfunctional requirements: A process-oriented approach
-
J. Mylopoulos, L. Chung, and B. Nixon. Representing and using nonfunctional requirements: A process-oriented approach. IEEE Trans. Softw. Eng., 18(6):483-497, 1992.
-
(1992)
IEEE Trans. Softw. Eng.
, vol.18
, Issue.6
, pp. 483-497
-
-
Mylopoulos, J.1
Chung, L.2
Nixon, B.3
|