Modeling Architectural Non Functional Requirements: From Use Case to Control Case
暂无分享,去创建一个
[1] John Mylopoulos,et al. Representing and Using Nonfunctional Requirements: A Process-Oriented Approach , 1992, IEEE Trans. Software Eng..
[2] Philippe Krutchen,et al. Architectural blueprints--the '4+1' view model of software architecture , 1995 .
[3] Ivar Jacobson,et al. Object-oriented software engineering - a use case driven approach , 1993, TOOLS.
[4] Ivar Jacobson,et al. Object-oriented development in an industrial environment , 1987, OOPSLA '87.
[5] Geri Schneider,et al. Applying use cases (2nd ed.): a practical guide , 2001 .
[6] Ivar Jacobson,et al. Use cases – Yesterday, today, and tomorrow , 2004, Software & Systems Modeling.
[7] Ivar Jacobson,et al. The unified modeling language reference manuel - covers UML 2.0, Second Edition , 2005, Addison Wesley object technology series.
[8] P. Krutchen,et al. The Rational Unified Process: An Introduction , 2000 .
[9] W BoyerKenneth. Advanced use case modeling , 2002 .
[10] Ivar Jacobson,et al. Object Oriented Development in an Industrial Environment , 1987, OOPSLA.
[11] G. Stoneburner,et al. Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .
[12] I. Alexander,et al. Misuse cases help to elicit non-functional requirements , 2003 .
[13] John E. Dobson,et al. A Methodology for Analysing Human and Computer-related Issues in Secure Systems , 1990 .
[14] Paul Clements,et al. Software Architecture: An Executive Overview , 1996 .
[15] K. Saleh,et al. CAPTURING NON-FUNCTIONAL SOFTWARE REQUIREMENTS USING THE USER REQUIREMENTS NOTATION , 2004 .
[16] L. Laibinis,et al. Fault Tolerance in Use-Case Modeling , 2005 .
[17] Andreas L. Opdahl,et al. Eliciting security requirements with misuse cases , 2000, Proceedings 37th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Pacific 2000.
[18] Jos Warmer,et al. The object constraint language , 1998 .
[19] D. Redmond-Pyle,et al. A Standard for Architecture Description , 1999, IBM Syst. J..
[20] Alistair Cockburn,et al. Patterns for Effective Use Cases , 2002 .
[21] Ivar Jacobson,et al. The Unified Modeling Language Reference Manual, Second Edition , 2005 .
[22] Connie U. Smith,et al. Performance solutions: a practical guide to creating responsive , 2001 .
[23] Zhixiong Liu,et al. Towards Modeling Non-Functional Requirements in Software Architecture , 2005 .
[24] Alan M. Davis,et al. Using Requirements Management to Speed Delivery of Higher Quality Applications , 1996 .
[25] Philippe Kruchten,et al. Architecture blueprints—the “4+1” view model of software architecture , 1995, TRI-Ada '95.
[26] Philippe Kruchten,et al. The 4+1 View Model of Architecture , 1995, IEEE Softw..
[27] John P. McDermott,et al. Using abuse case models for security requirements analysis , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).