-
1
-
-
0037240812
-
Misuse cases, use cases with hostile intent
-
Alexander, I. F. 2003. Misuse cases, use cases with hostile intent. IEEE Software, 20(1): 58-66.
-
(2003)
IEEE Software
, vol.20
, Issue.1
, pp. 58-66
-
-
Alexander, I.F.1
-
2
-
-
27644438149
-
-
New York, NY: John Wiley and Sons
-
Alexander, I. F. and Maiden, N. 2004. Scenarios, stories, use cases: Through the systems development life-cycle, New York, NY: John Wiley and Sons.
-
(2004)
Scenarios, stories, use cases: Through the systems development life-cycle
-
-
Alexander, I.F.1
Maiden, N.2
-
4
-
-
33646387991
-
Developing the electronic health record: What about patient safety?
-
Boaden, R. and Joyce, P. 2006. Developing the electronic health record: What about patient safety?. Health Services Management Research, 19: 94-104.
-
(2006)
Health Services Management Research
, vol.19
, pp. 94-104
-
-
Boaden, R.1
Joyce, P.2
-
6
-
-
80455166813
-
-
Minneapolis, MN: ICSE, IEEE Computer Society 2007
-
Cheng, B. H. and Atlee, J. M. June 4 2007. Research directions in requirements engineering, Future of Software Engineering (FOSE), June 4, Minneapolis, MN: ICSE, IEEE Computer Society. 2007
-
(2007)
Research directions in requirements engineering, Future of Software Engineering (FOSE)
-
-
Cheng, B.H.1
Atlee, J.M.2
-
7
-
-
0027574423
-
Goal-directed requirements acquisition
-
Dardenne, A., van Lamsweerde, A., and Fickas, S. 1993. Goal-directed requirements acquisition. Science of Computer Programming, 20(1-2): 3-50.
-
(1993)
Science of Computer Programming
, vol.20
, Issue.1-2
, pp. 3-50
-
-
Dardenne, A.1
van Lamsweerde, A.2
Fickas, S.3
-
8
-
-
75749107370
-
-
Halden, MN: International Seminar on Dependable Requirements Engineering of Computerized Systems at NPPs, Institute for Energy Technology (IFE)
-
Dobson, G. and Sawyer, P. 2006. Revisiting ontology-based requirements engineering in the age of the semantic Web, Halden, MN: International Seminar on Dependable Requirements Engineering of Computerized Systems at NPPs, Institute for Energy Technology (IFE).
-
(2006)
Revisiting ontology-based requirements engineering in the age of the semantic Web
-
-
Dobson, G.1
Sawyer, P.2
-
11
-
-
35148839490
-
A translation approach to portable ontology specification
-
Gruber, T. R. 1993. A translation approach to portable ontology specification. Knowledge Acquisition, 5: 199-220.
-
(1993)
Knowledge Acquisition
, vol.5
, pp. 199-220
-
-
Gruber, T.R.1
-
12
-
-
58149365542
-
Towards principles for the design of ontologies used for knowledge sharing
-
Gruber, T. R. 1995. Towards principles for the design of ontologies used for knowledge sharing. International Journal of Human and Computer Studies, 43(5/6): 907-928.
-
(1995)
International Journal of Human and Computer Studies
, vol.43
, Issue.5-6
, pp. 907-928
-
-
Gruber, T.R.1
-
13
-
-
33750962363
-
An ontology for secure e-government applications
-
Vienna, Austio: Vienna University of Technology
-
Karyda, M., Balopoulos, T., Gymnopoulos, L., Kokolakis, S., Lambrinoudakis, C., Gritzalis, S. and Dritsas, S. April 20-22 2006. "An ontology for secure e-government applications". In Proceedings of the First International Conference on Availability, Reliability and Security, April 20-22, Vienna, Austio: Vienna University of Technology.
-
(2006)
Proceedings of the First International Conference on Availability, Reliability and Security
-
-
Karyda, M.1
Balopoulos, T.2
Gymnopoulos, L.3
Kokolakis, S.4
Lambrinoudakis, C.5
Gritzalis, S.6
Dritsas, S.7
-
14
-
-
68149178849
-
Modeling reusable security requirements based on an ontology framework
-
Lasheras, J., Valencia-García, R., Fernández-Breis, J. T. and Toral, A. 2009. Modeling reusable security requirements based on an ontology framework. Journal of Research and Practice in Information Technology, 41(2): 119-133.
-
(2009)
Journal of Research and Practice in Information Technology
, vol.41
, Issue.2
, pp. 119-133
-
-
Lasheras, J.1
Valencia-García, R.2
Fernández-Breis, J.T.3
Toral, A.4
-
15
-
-
0346129361
-
A requirement ontology for engineering design
-
Lin, J., Fox, M. S. and Bilgic, T. 1996. A requirement ontology for engineering design. Concurrent Engineering: Research and Applications, 4(4): 279-291.
-
(1996)
Concurrent Engineering: Research and Applications
, vol.4
, Issue.4
, pp. 279-291
-
-
Lin, J.1
Fox, M.S.2
Bilgic, T.3
-
16
-
-
67650141501
-
-
College Park, MD: University of Maryland
-
Mayank, V., Kositsyna, N. and Austin, M. 2004. Requirements engineering and the semantic Web, Part II. Representation, management, and validation of requirements and system-level architectures (Technical Report. TR 2004-14), College Park, MD: University of Maryland.
-
(2004)
Requirements engineering and the semantic Web, Part II. Representation, management, and validation of requirements and system-level architectures (Technical Report. TR 2004-14)
-
-
Mayank, V.1
Kositsyna, N.2
Austin, M.3
-
17
-
-
0025498594
-
Telos: Representing knowledge about information systems
-
Mylopoulos, J., Borgida, A., Jarve, M. and Koubarakis, M. 1990. Telos: Representing knowledge about information systems. ACM Transactions on Information Systems, 8: 325-362.
-
(1990)
ACM Transactions on Information Systems
, vol.8
, pp. 325-362
-
-
Mylopoulos, J.1
Borgida, A.2
Jarve, M.3
Koubarakis, M.4
-
19
-
-
84862177331
-
-
Protege Ontology Editor and Knowledge Acquisition System Stanford University
-
Protege Ontology Editor and Knowledge Acquisition System. (2004). Stanford University. http://protege.stanford.edu/.
-
(2004)
-
-
-
20
-
-
77954606675
-
An extended misuse case notation: Including vulnerabilities and the insider threats
-
Luxembourg: Essener Informatik Beitrage
-
Rostad, L. 2006. "An extended misuse case notation: Including vulnerabilities and the insider threats". In Proceedings of Requirements Engineering: Foundation for Software Quality (REFSQ'06), 33-43. Luxembourg: Essener Informatik Beitrage.
-
(2006)
Proceedings of Requirements Engineering: Foundation for Software Quality (REFSQ'06)
, pp. 33-43
-
-
Rostad, L.1
-
21
-
-
50249091529
-
-
Australia: Paper presented at the Software Engineering Conference ASWEC 2008, March 25-28, Perth
-
Vorobiev, A., Han, J. and Bekmamedova, N. 2008. An ontology framework for managing security attacks and defenses in component-based software systems, Australia: Paper presented at the Software Engineering Conference ASWEC 2008, March 25-28, Perth.
-
(2008)
An ontology framework for managing security attacks and defenses in component-based software systems
-
-
Vorobiev, A.1
Han, J.2
Bekmamedova, N.3
-
23
-
-
0027983421
-
Using goals, rules, and methods to support reasoning in business process reengineering
-
Maui, Hawaii
-
Yu, E. and Mylopoulos, J. 1994. Using goals, rules, and methods to support reasoning in business process reengineering. Proceedings of the 27th International Conference on System Sciences 243-243. Maui, Hawaii
-
(1994)
Proceedings of the 27th International Conference on System Sciences
, pp. 243
-
-
Yu, E.1
Mylopoulos, J.2
|