Requirements Engineering
暂无分享,去创建一个
[1] Mariëlle den Hengst,et al. Assessing the Quality of Collaborative Processes , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[2] S. Kanmani,et al. Survey and analysis on Security Requirements Engineering , 2012, Comput. Electr. Eng..
[3] Isabelle Comyn-Wattiau,et al. Ontologies for Security Requirements: A Literature Survey and Classification , 2012, CAiSE Workshops.
[4] John Mylopoulos,et al. ST-tool: a CASE tool for security requirements engineering , 2005, 13th IEEE International Conference on Requirements Engineering (RE'05).
[5] Yuanyuan Zhang,et al. App store mining and analysis: MSR for app stores , 2012, 2012 9th IEEE Working Conference on Mining Software Repositories (MSR).
[6] Gunnar Peterson. Building Security In , 2006 .
[7] Eric S. K. Yu,et al. A Semi-automated Decision Support Tool for Requirements Trade-Off Analysis , 2011, 2011 IEEE 35th Annual Computer Software and Applications Conference.
[8] Kurt Schneider,et al. Feedback in Context: Supporting the Evolution of IT-Ecosystems , 2010, PROFES.
[9] James Noble,et al. Patterns for essential use case bodies , 2003 .
[10] Bernd Heinrich,et al. Granularity of Services , 2011, Bus. Inf. Syst. Eng..
[11] Mario Piattini,et al. Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes , 2006, TrustBus.
[12] Olivia R. Liu Sheng,et al. Examining the Technology Acceptance Model Using Physician Acceptance of Telemedicine Technology , 1999, J. Manag. Inf. Syst..
[13] William Yurcik,et al. Threat Modeling as a Basis for Security Requirements , 2005 .
[14] Pierluigi Roberti,et al. STS-tool: Socio-technical Security Requirements through social commitments , 2012, 2012 20th IEEE International Requirements Engineering Conference (RE).
[15] Evan W. Duggan,et al. Higher Quality Requirements: Supporting Joint Application Development with the Nominal Group Technique , 2003, Inf. Technol. Manag..
[16] Birgit Pfitzmann,et al. Security in Business Process Engineering , 2003, Business Process Management.
[17] Andrew Gemino,et al. A framework for empirical evaluation of conceptual modeling techniques , 2004, Requirements Engineering.
[18] Jan Jürjens,et al. Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec , 2010, Requirements Engineering.
[19] Claudia Steghuis. Service granularity in SOA-projects : a trade-off analysis , 2006 .
[20] John Viega. Building security requirements with CLASP , 2005, SOEN.
[21] Tore Dybå,et al. A systematic review of statistical power in software engineering experiments , 2006, Inf. Softw. Technol..
[22] Muneera Bano,et al. Service Oriented Requirements Engineering: Practitioner's Perspective , 2013, ICSOC Workshops.
[23] Bernd Fröhlich,et al. The cubic mouse: a new device for three-dimensional input , 2000, CHI.
[24] Laurence Brooks,et al. CHAPTER 53 APPLYING SOCIAL-TECHNICAL APPROACH FOR COTS SELECTION * , 1999 .
[25] A. Gehlert,et al. Goal-Driven Alignment of Services and Business Requirements , 2008, 2008 International Workshop on Service-Oriented Computing: Consequences for Engineering Requirements.
[26] Muneera Bano,et al. User involvement in software development and system success: a systematic literature review , 2013, EASE '13.
[27] Maria Kutar,et al. Cognitive Dimensions of Notations: Design Tools for Cognitive Technology , 2001, Cognitive Technology.
[28] H. Kaindl,et al. How to Combine Requirements Engineering and Interaction Design? , 2008, 2008 16th IEEE International Requirements Engineering Conference.
[29] Massimiliano Di Penta,et al. An experimental investigation of formality in UML-based development , 2005, IEEE Transactions on Software Engineering.
[30] Tore Dybå,et al. Challenges and Recommendations When Increasing the Realism of Controlled Software Engineering Experiments , 2003, ESERNET.
[31] Günther Pernul,et al. Viewing Business-Process Security from Different Perspectives , 1999, Int. J. Electron. Commer..
[32] Naveed Ikram,et al. What makes service oriented requirements engineering challenging? a qualitative study , 2014, IET Softw..
[33] Mike P. Papazoglou,et al. Service-oriented design and development methodology , 2006, Int. J. Web Eng. Technol..
[34] John C. Grundy,et al. Improving requirements quality using essential use case interaction patterns , 2011, 2011 33rd International Conference on Software Engineering (ICSE).
[35] Massila Kamalrudin,et al. A review on tool supports for security requirements engineering , 2013, 2013 IEEE Conference on Open Systems (ICOS).
[36] Zhong Chen,et al. Extracting Service Aspects from Web Reviews , 2010, WISM.
[37] Neil A. M. Maiden,et al. Using Mobile RE Tools to Give End-Users Their Own Voice , 2010, 2010 18th IEEE International Requirements Engineering Conference.
[38] Mohammad Zulkernine,et al. Intrusion detection aware component-based systems: A specification-based framework , 2007, J. Syst. Softw..
[39] Neil A. M. Maiden,et al. Discovering Web Services to Improve Requirements Specifications: Does It Help? , 2008, REFSQ.
[40] Harold A. Linstone,et al. The Unbounded Mind: Breaking the Chains of Traditional Business Thinking , 1993 .
[41] S. Adam,et al. Deriving Software Services from Business Processes of Representative Customer Organizations , 2008, 2008 International Workshop on Service-Oriented Computing: Consequences for Engineering Requirements.
[42] Jing Du,et al. An Analysis for Understanding Software Security Requirement Methodologies , 2009, 2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement.
[43] Kristina Winbladh,et al. Analysis of user comments: An approach for software requirements evolution , 2013, 2013 35th International Conference on Software Engineering (ICSE).
[44] Donald Firesmith,et al. Specifying Reusable Security Requirements , 2004, J. Object Technol..
[45] Xiaozhong Liu,et al. Predicting popularity of online distributed applications: iTunes app store case analysis , 2011, iConference.
[46] John C. Grundy,et al. Managing Consistency between Textual Requirements, Abstract Interactions and Essential Use Cases , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference.
[47] Walid Maalej,et al. User feedback in the appstore: An empirical study , 2013, 2013 21st IEEE International Requirements Engineering Conference (RE).
[48] John Mylopoulos,et al. Modeling security requirements through ownership, permission and delegation , 2005, 13th IEEE International Conference on Requirements Engineering (RE'05).
[49] Rudolf Vetschera,et al. Preference-Based Decision Support in Software Engineering , 2006, Value-Based Software Engineering.
[50] Shareeful Islam,et al. SecTro: A CASE Tool for Modelling Security in Requirements Engineering using Secure Tropos , 2011, CAiSE Forum.
[51] Matthias Galster,et al. A Business-Goal-Service-Capability Graph for the Alignment of Requirements and Services , 2008, 2008 IEEE Congress on Services - Part I.
[52] Jan Jürjens,et al. Enhancing security requirements engineering by organizational learning , 2012, Requirements Engineering.
[53] Naveed Ikram,et al. Issues and Challenges of Requirement Engineering in Service Oriented Software Development , 2010, 2010 Fifth International Conference on Software Engineering Advances.