A meta-pattern and pattern form for context-patterns
暂无分享,去创建一个
Kristian Beckers | Stephan Faßbender | Maritta Heisel | Santiago Suppan | Kristian Beckers | Stephan Faßbender | M. Heisel | S. Suppan
[1] Michael A. Jackson,et al. Problem Frames - Analysing and Structuring Software Development Problems , 2000 .
[2] Martin Fowler,et al. Patterns of Enterprise Application Architecture , 2002 .
[4] Kristian Beckers,et al. A Pattern-Based Method for Identifying and Analyzing Laws , 2012, REFSQ.
[5] Ralph Johnson,et al. design patterns elements of reusable object oriented software , 2019 .
[6] Donald Firesmith,et al. Specifying Good Requirements , 2003, J. Object Technol..
[7] Kristian Beckers,et al. A Threat Analysis Methodology for Smart Home Scenarios , 2014, SmartGridSec.
[8] Stephan Faßbender,et al. From Problems to Laws in Requirements Engineering - Using Model-Transformation , 2016, ICSOFT.
[9] Daniel M. Berry,et al. The impact of domain knowledge on the effectiveness of requirements idea generation during requirements elicitation , 2012, 2012 20th IEEE International Requirements Engineering Conference (RE).
[10] 日本規格協会. 情報技術-セキュリティ技術-情報セキュリティマネジメントシステム-要求事項 : 国際規格ISO/IEC 27001 = Information technology-Security techniques-Information security management systems-Requirements : ISO/IEC 27001 , 2005 .
[11] Kristian Beckers,et al. A meta-model for context-patterns , 2013, EuroPLoP.
[12] Kristian Beckers,et al. An Integrated Method for Pattern-Based Elicitation of Legal Requirements Applied to a Cloud Computing Example , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.
[13] Maritta Heisel,et al. A comparison of security requirements engineering methods , 2010, Requirements Engineering.
[14] Martin Fowler,et al. Analysis patterns - reusable object models , 1996, Addison-Wesley series in object-oriented software engineering.
[15] R. R. Willis,et al. Hughes Aircraft's Widespread Deployment of a Continuously Improving Software Process , 1998 .
[16] Barry W. Boehm,et al. Understanding and Controlling Software Costs , 1988, IEEE Trans. Software Eng..
[17] Kristian Beckers,et al. Pattern-Based Support for Context Establishment and Asset Identification of the ISO 27000 in the Field of Cloud Computing , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[18] Qing Li,et al. IDEF4 Object-Oriented Design Method , 2009 .
[19] Kristian Beckers,et al. Trust-Aware Decision-Making Methodology for Cloud Sourcing , 2014, CAiSE.
[20] Peter Sommerlad,et al. Security Patterns: Integrating Security and Systems Engineering , 2006 .
[21] Helen M. Edwards,et al. Problem frames: analyzing and structuring software development problems , 2002, Softw. Test. Verification Reliab..
[22] Kristian Beckers,et al. Peer-to-Peer Driven Software Engineering Considering Security, Reliability, and Performance , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.
[23] M. Heisel. Agendas—a concept to guide software development activities , 1998 .
[24] Kristian Beckers,et al. Pattern-Based Context Establishment for Service-Oriented Architectures , 2012, Software Service and Application Engineering.