-
1
-
-
84889986653
-
Software Architecture Evolution
-
Mens, T., Demeyer, S. (eds.) Software Evolution. Springer, Heidelberg
-
Barais, O., Le Meur, A.F., Duchien, L., Lawall, J.: Software Architecture Evolution. In: Mens, T., Demeyer, S. (eds.) Software Evolution. LNCS, pp. 233-262. Springer, Heidelberg (2008)
-
(2008)
LNCS
, pp. 233-262
-
-
Barais, O.1
Le Meur, A.F.2
Duchien, L.3
Lawall, J.4
-
2
-
-
36849087931
-
Systematic Integration between Requirements and Architecture
-
Choren, R., Garcia, A., Lucena, C., Romanovsky, A. (eds.) SELMAS 2004. Springer, Heidelberg
-
Bastos, L.R.D., Castro, J.F.B.: Systematic Integration Between Requirements and Architecture. In: Choren, R., Garcia, A., Lucena, C., Romanovsky, A. (eds.) SELMAS 2004. LNCS, vol. 3390, pp. 85-103. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3390
, pp. 85-103
-
-
Bastos, L.R.D.1
Castro, J.F.B.2
-
3
-
-
84943233377
-
Adaptive and Dynamic Service Composition in eFlow
-
Wangler, B., Bergman, L.D. (eds.) CAiSE 2000. Springer, Heidelberg
-
Casati, F., Ilnicki, S., Jin, L., Krishnamoorthy, V., Shan, M.-C.: Adaptive and Dynamic Service Composition in eFlow. In: Wangler, B., Bergman, L.D. (eds.) CAiSE 2000. LNCS, vol. 1789, pp. 13-31. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1789
, pp. 13-31
-
-
Casati, F.1
Ilnicki, S.2
Jin, L.3
Krishnamoorthy, V.4
Shan, M.-C.5
-
4
-
-
84948972584
-
Security Requirements Engineering: When Anti-Requirements Hit the Fan
-
IEEE
-
Crook, R., Ince, D., Lin, L., Nuseibeh, B.: Security Requirements Engineering: When Anti-Requirements Hit the Fan. In: Proc. of RE 2002, pp. 203-205. IEEE (2002)
-
(2002)
Proc. of RE 2002
, pp. 203-205
-
-
Crook, R.1
Ince, D.2
Lin, L.3
Nuseibeh, B.4
-
6
-
-
0042363394
-
Quantifying the Financial Impact of IT Security Breaches
-
Garg, A., Curtis, J., Halper, H.: Quantifying the Financial Impact of IT Security Breaches. Information Management & Computer Security 11(2), 74-83 (2003)
-
(2003)
Information Management & Computer Security
, vol.11
, Issue.2
, pp. 74-83
-
-
Garg, A.1
Curtis, J.2
Halper, H.3
-
7
-
-
73549097759
-
Compliance Analysis Based on a Goaloriented Requirement Language Evaluation Methodology
-
Ghanavati, S., Amyot, D., Peyton, L.: Compliance Analysis Based on a Goaloriented Requirement Language Evaluation Methodology. In: Proc. of RE 2009, pp. 133-142 (2009)
-
(2009)
Proc. of RE 2009
, pp. 133-142
-
-
Ghanavati, S.1
Amyot, D.2
Peyton, L.3
-
8
-
-
38349004887
-
Auditing Business Process Compliance
-
Krämer, B.J., Lin, K.-J., Narasimhan, P. (eds.) ICSOC 2007.
-
Ghose, A., Koliadis, G.: Auditing Business Process Compliance. In: Krämer, B.J., Lin, K.-J., Narasimhan, P. (eds.) ICSOC 2007. LNCS, vol. 4749, pp. 169-180.
-
LNCS
, vol.4749
, pp. 169-180
-
-
Ghose, A.1
Koliadis, G.2
-
9
-
-
27644537252
-
Modeling Security Requirements through Ownership, Permission and Delegation
-
IEEE
-
Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Modeling Security Requirements through Ownership, Permission and Delegation. In: Proc. of RE 2005, pp. 167-176. IEEE (2005)
-
(2005)
Proc. of RE 2005
, pp. 167-176
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
10
-
-
84936941964
-
Relating Software Requirements and Architectures using Problem Frames
-
IEEE
-
Hall, J.G., Jackson, M., Laney, R.C., Nuseibeh, B., Rapanotti, L.: Relating Software Requirements and Architectures using Problem Frames. In: Proc. of RE 2002, pp. 137-144. IEEE (2002)
-
(2002)
Proc. of RE 2002
, pp. 137-144
-
-
Hall, J.G.1
Jackson, M.2
Laney, R.C.3
Nuseibeh, B.4
Rapanotti, L.5
-
11
-
-
84991969449
-
The Change and Evolution of Requirements as a Challenge to the Practice of Software Engineering
-
IEEE
-
Harker, S.D.P., Eason, K.D., Dobson, J.E.: The Change and Evolution of Requirements as a Challenge to the Practice of Software Engineering. In: Proc. of RE 1993, pp. 266-272. IEEE (1993)
-
(1993)
Proc. of RE 1993
, pp. 266-272
-
-
Harker, S.D.P.1
Eason, K.D.2
Dobson, J.E.3
-
13
-
-
34247861351
-
A Static Compliance-Checking Framework for Business Process Models
-
Liu, Y., Müller, S., Xu, K.: A Static Compliance-Checking Framework for Business Process Models. IBM Systems Journal 46(2), 335-361 (2007)
-
(2007)
IBM Systems Journal
, vol.46
, Issue.2
, pp. 335-361
-
-
Liu, Y.1
Müller, S.2
Xu, K.3
-
14
-
-
85045573601
-
Using Abuse Case Models for Security Requirements Analysis
-
IEEE
-
McDermott, J., Fox, C.: Using Abuse Case Models for Security Requirements Analysis. In: Proc. of ACSAC 1999, pp. 55-64. IEEE (1999)
-
(1999)
Proc. of ACSAC 1999
, pp. 55-64
-
-
McDermott, J.1
Fox, C.2
-
16
-
-
85008523798
-
Weaving together requirements and architectures
-
Nuseibeh, B.: Weaving together requirements and architectures. Computer 34(3), 115-119 (2001)
-
(2001)
Computer
, vol.34
, Issue.3
, pp. 115-119
-
-
Nuseibeh, B.1
-
18
-
-
34247151648
-
A BPMN Extension for the Modeling of Security requirements in Business Processes
-
Rodríguez, A., Fernández-Medina, E., Piattini, M.: A BPMN Extension for the Modeling of Security requirements in Business Processes. IEICE Transactions on Information and Systems 90(4), 745-752 (2007)
-
(2007)
IEICE Transactions on Information and Systems
, vol.90
, Issue.4
, pp. 745-752
-
-
Rodríguez, A.1
Fernández-Medina, E.2
Piattini, M.3
-
19
-
-
13644252644
-
Eliciting Security Requirements with Misuse Cases
-
Sindre, G., Opdahl, A.L.: Eliciting Security Requirements with Misuse Cases. Requirements Engineering 10(1), 34-44 (2005)
-
(2005)
Requirements Engineering
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
20
-
-
0032675444
-
An Ontology for Commitments in Multiagent Systems: Toward a Unification of Normative Concepts
-
Singh, M.P.: An Ontology for Commitments in Multiagent Systems: Toward a Unification of Normative Concepts. Artificial Intelligence and Law 7(1), 97-113 (1999)
-
(1999)
Artificial Intelligence and Law
, vol.7
, Issue.1
, pp. 97-113
-
-
Singh, M.P.1
-
21
-
-
77149132467
-
Compliance with Information Security Policies: An Empirical Investigation
-
Siponen, M., Pahnila, S., Adam Mahmood, M.: Compliance with Information Security Policies: An Empirical Investigation. Computer 43, 64-71 (2010)
-
(2010)
Computer
, vol.43
, pp. 64-71
-
-
Siponen, M.1
Pahnila, S.2
Adam Mahmood, M.3
-
22
-
-
0033716145
-
Requirements Engineering in the Year 2000: A Research Perspective
-
van Lamsweerde, A.: Requirements Engineering in the Year 2000: A Research Perspective. In: Proc. of ICSE 2000, pp. 5-19 (2000)
-
(2000)
Proc. of ICSE 2000
, pp. 5-19
-
-
Van Lamsweerde, A.1
-
23
-
-
35248827688
-
From System Goals to Software Architecture
-
Bernardo, M., Inverardi, P. (eds.) SFM 2003. Springer, Heidelberg
-
van Lamsweerde, A.: From System Goals to Software Architecture. In: Bernardo, M., Inverardi, P. (eds.) SFM 2003. LNCS, vol. 2804, pp. 25-43. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2804
, pp. 25-43
-
-
Van Lamsweerde, A.1
-
24
-
-
4544255381
-
Elaborating Security Requirements by Construction of Intentional Anti-Models
-
IEEE
-
van Lamsweerde, A.: Elaborating Security Requirements by Construction of Intentional Anti-Models. In: Proc. of ICSE 2004, pp. 148-157. IEEE (2004)
-
(2004)
Proc. of ICSE 2004
, pp. 148-157
-
-
Van Lamsweerde, A.1
|