Search
Now showing items 21-30 of 15058
Support Tool to the Validation Process of Functional Requirements
(Institute of Electrical and Electronics Engineers (IEEE), 2014)
Using the AMAN-DA method to generate security requirements: a case study in the maritime domain
(London : Springer-Verlag, 2018-11-01)
Security requirements are known to be “the most difficult of requirements types” and potentially the ones causing the greatest risk if they are not correct. One approach to requirements elicitation is based on the reuse ...
Understanding And Guiding Software Product Lines Evolution Based On Requirements Engineering Activities
(Instituto de Matem??ticaPrograma Multiinstitucional de P??s-gradua????o em Ci??ncia da Computa????o, UFBA-UNIFACS-UEFSIMbrasil, 2017-06-07)
Understanding And Guiding Software Product Lines Evolution Based On Requirements Engineering Activities
(Instituto de MatemáticaPrograma Multiinstitucional de Pós-graduação em Ciência da Computação, UFBA-UNIFACS-UEFSIMbrasil, 2017-06-07)
Software Product Line (SPL) has emerged as an important strategy to cope with the increasing demand of large-scale products customization. SPL has provided companies with an efficient and effective means of delivering ...
Analyzing Requirements Engineering for Cloud Computing
(Springer, 2017)
Cloud computing is a business paradigm, where cloud providers offer resources (e.g., storage, computing, network) and cloud consumers use them after accepting a specific service level agreement. Cloud requirements can ...
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates
(2017)
Identifying security requirements early on can lay the foundation for secure software development. Security requirements are often implied by existing functional requirements but are mostly left unspecified. The Security ...
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates
(2017)
Identifying security requirements early on can lay the foundation for secure software development. Security requirements are often implied by existing functional requirements but are mostly left unspecified. The Security ...