Modelling the Interplay of Conflicting Goals with Use and Misuse Cases
暂无分享,去创建一个
[1] Andreas L. Opdahl,et al. Eliciting security requirements with misuse cases , 2004, Requirements Engineering.
[2] Axel van Lamsweerde,et al. Integrating obstacles in goal-driven requirements engineering , 1998, Proceedings of the 20th International Conference on Software Engineering.
[3] Ian F. Alexander,et al. Initial industrial experience of misuse cases in trade-off analysis , 2002, Proceedings IEEE Joint International Conference on Requirements Engineering.
[4] Mordechai Ben-Menachem,et al. Writing effective use cases , 2001, SOEN.
[5] John P. McDermott,et al. Using abuse case models for security requirements analysis , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[6] Tim Kelly,et al. Deriving safety requirements using scenarios , 2001, Proceedings Fifth IEEE International Symposium on Requirements Engineering.
[7] Ivar Jacobson,et al. Object-oriented software engineering - a use case driven approach , 1993, TOOLS.
[8] Annie I. Antón,et al. The use of goals to surface requirements for evolving systems , 1998, Proceedings of the 20th International Conference on Software Engineering.