default search action
Requirements Engineering, Volume 15
Volume 15, Number 1, March 2010
- Eric Dubois, Haralambos Mouratidis:
Guest editorial: security requirements engineering: past, present and future. 1-5 - Benjamin Fabian, Seda F. Gürses, Maritta Heisel, Thomas Santen, Holger Schmidt:
A comparison of security requirements engineering methods. 7-40 - Golnaz Elahi, Eric S. K. Yu, Nicola Zannone:
A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities. 41-62 - Siv Hilde Houmb, Shareeful Islam, Eric Knauss, Jan Jürjens, Kurt Schneider:
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec. 63-93 - Igor Siveroni, Andrea Zisman, George Spanoudakis:
A UML-based static verification framework for security. 95-118 - Aaron K. Massey, Paul N. Otto, Lauren J. Hayward, Annie I. Antón:
Evaluating existing security and privacy requirements for legal compliance. 119-137
Volume 15, Number 2, June 2010
- Kevin Ryan:
Introduction to the RE'09 special issue. 139-140 - Daniel Laurence Moody, Patrick Heymans, Raimundas Matulevicius:
Visual syntax does matter: improving the cognitive effectiveness of the i* visual notation. 141-175 - Jon Whittle, Peter Sawyer, Nelly Bencomo, Betty H. C. Cheng, Jean-Michel Bruel:
RELAX: a language to address uncertainty in self-adaptive systems requirement. 177-196 - Gunter Mussbacher, Jon Whittle, Daniel Amyot:
Modeling and detecting semantic-based interactions in aspect-oriented scenarios. 197-214 - Remo Ferrari, James A. Miller, Nazim H. Madhavji:
A controlled experiment to assess the impact of system architectures on new system requirements. 215-233 - Shahram Esmaeilsabzali, Nancy A. Day, Joanne M. Atlee, Jianwei Niu:
Deconstructing the semantics of big-step modelling languages. 235-265
Volume 15, Number 3, September 2010
- Rubén Fuentes-Fernández, Jorge J. Gómez-Sanz, Juan Pavón:
Understanding the human context in requirements elicitation. 267-283 - Mohamed El-Attar, James Miller:
Developing comprehensive acceptance tests from use cases and robustness diagrams. 285-306 - Hermann Kaindl, Davor Svetinovic:
On confusion between requirements and their representations. 307-311 - Senthil Karthikeyan Sundaram, Jane Huffman Hayes, Alex Dekhtyar, Elizabeth Ashlee Holbrook:
Assessing traceability of software engineering artifacts. 313-335 - Jim McElroy, Günther Ruhe:
When-to-release decisions for features with time-dependent value functions. 337-358
Volume 15, Number 4, November 2010
- Christian Wolter, Christoph Meinel:
An approach to capture authorisation requirements in business processes. 359-373 - Chen Li, Marjan van den Akker, Sjaak Brinkkemper, Guido Diepen:
An integrated approach for requirement selection and scheduling in software release planning. 375-396 - Gabriela N. Aranda, Aurora Vizcaíno, Mario Piattini:
A framework to improve communication during the requirements elicitation process in GSD projects. 397-417 - Raian Ali, Fabiano Dalpiaz, Paolo Giorgini:
A goal-based framework for contextual requirements modeling and analysis. 439-458
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.