Filters








900,137 Hits in 6.6 sec

Using the Common Criteria to Elicit Security Requirements with Use Cases

M.S. Ware, J.B. Bowles, C.M. Eastman
Proceedings of the IEEE SoutheastCon 2006  
To help address these issues, this paper presents an approach to eliciting security requirements for IT systems with use cases using Common Criteria methodologies.  ...  Violet, an open source UML diagram modeling tool, has been extended to implement the approach from a use case textual description perspective.  ...  Thus, this paper presents a CC approach to eliciting security requirements of IT systems based on use case "actor profiles".  ... 
doi:10.1109/second.2006.1629363 fatcat:qtp7jchzlnh47bqanxjkrtpuny

Eliciting and specifying requirements with use cases for embedded systems

E. Nasr, J. McDermid, G. Bernat
Proceedings of the Seventh IEEE International Workshop on Object-Oriented Real-Time Dependable Systems. (WORDS 2002)  
This paper proposes enhancements to the use case technique for eliciting and specifying requirements for embedded systems.  ...  The work resulted from the employment of the use case technique for the requirements elicitation and specification of embedded systems in an industrial context.  ...  We would like to acknowledge the input of the PRECEPT partner, Phillips Research Laboratories, Surrey, to the use case modelling process guidelines.  ... 
doi:10.1109/words.2002.1000073 dblp:conf/words/NasrMB02 fatcat:qu3ygpmusjhlrcstrmvkdz3t5i

Elicitation and Modeling Non-Functional Requirements – A POS Case Study

Md. Mijanur Rahman, Shamim Ripon
2013 International Journal of Future Computer and Communication  
Eliciting NFRs are considered to be one of the challenging jobs in requirement analysis. This paper proposes a UML use case based questionary approach to identifying and classifying NFR of a system.  ...  The proposed approach is illustrated by using a Point of Sale (POS) case study  ...  In this paper we have proposed NFRs elicitation technique based on use case extensions. We have extended use case diagram and incorporate NFRs eliciting questions with functional requirements.  ... 
doi:10.7763/ijfcc.2013.v2.211 fatcat:e5l7rvzkpbbnfaa6qs6m2lun7m

Improving the quality and quantity of functional and non-functional requirements obtained during requirements elicitation stage for the development of e-commerce mobile applications: An alternative reference process model

Dennys Garcia, Marco Segura-Morales, Edison Loza-Aguirre
2019 IET Software  
The survey results indicated that RPM-REFEMAD model helps to elicit more quality and quantity functional and non-functional requirements, in comparison with the use of traditional requirements elicitation  ...  In many cases, this is because the software requirements were not correctly identified.  ...  functional requirements elicitation using brainstorming technique with sticky notes.  ... 
doi:10.1049/iet-sen.2018.5443 fatcat:6o6kyesk5fcpzobj4ew5bwdopm

ESEM19_Supplementary_Materials [article]

Nitish Patkar
2019 Figshare  
framework for eliciting and modeling system dependability requirements: Experience from the NASA high dependability computing project T18 UCEd (Use Case Editor) 2006 S79 Supporting use case based  ...  REASSURE: Requirements elicitation for adaptive socio-technical systems using repertory grid Using the AMAN-DA method to generate security requirements: a case study in the maritime domain Introducing  ... 
doi:10.6084/m9.figshare.8307089 fatcat:yqiavc3lcjgnrpqiaqvevlirtu

Eliciting usable security requirements with misusability cases

Shamal Faily, Ivan Flechais
2011 2011 IEEE 19th International Requirements Engineering Conference  
We describe the steps carried out to develop and apply misusability cases to elicit requirements and report preliminary results applying this technique in a recent case study.  ...  Although widely used for both security and usability concerns, scenarios used in security design may not necessarily inform the design of usability, and vice-versa.  ...  ACKNOWLEDGMENT This research was funded by the EPSRC CASE Studentship R07437/CN001, and by the EU FP7 webinos Project (FP7-ICT-2009-5 Objective 1.2) .  ... 
doi:10.1109/re.2011.6051665 dblp:conf/re/FailyF11 fatcat:htcu4nfqgfhrleuqbjncgdywsa

Eliciting contextual requirements at design time: A case study

Alessia Knauss, Daniela Damian, Kurt Schneider
2014 2014 IEEE 4th International Workshop on Empirical Requirements Engineering (EmpiRE)  
In a case study we investigate end-user viewpoints, together with interviews, scenarios, prototyping, goal-based analysis, and groupwork as a means to elicit and clarify contextual requirements already  ...  Our goal in this paper is to explore the usefulness of existing requirements elicitation techniques for the identification of contextual requirements early, i.e. at design time.  ...  ACKNOWLEDGEMENTS Special thanks goes to the project managers for giving us the opportunity to study requirements elicitation in a real project and the participants of the study for their time and support  ... 
doi:10.1109/empire.2014.6890117 dblp:conf/re/KnaussDS14 fatcat:o5sucapqibcyzpvz2oc7njxwre

Organization Goal-Oriented Requirements Elicitation Process to Enhance Information System

Fransiskus Adikara, Bayu Hendradjaya, Benhard Sitohang
2016 International Journal of Electrical and Computer Engineering (IJECE)  
KPIs can be used to control and reduce user requirements problems caused by personal interests of users in requirements elicitation process.  ...  The case study shows that the requirements can be elicited from the organization goals and current information system condition rather than from user requirements.  ...  The Implementation of Organization Goal-Oriented Requirements Elicitation Process Using organization goal-oriented requirements elicitation elicitation process, the process started with a small discussion  ... 
doi:10.11591/ijece.v6i6.12802 fatcat:ph2qn2c76rdgzp3bjcyvsqgda4

Structured Language Requirement Elicitation Using Case Base Reasoning

Marryam Murtaza, Jamal Hussain Shah, Aisha Azeem, Wasif Nisar, Maria Masood
2013 Research Journal of Applied Sciences Engineering and Technology  
The use of case-based reasoning in requirements elicitation process has greatly reduced the burden and saved time of requirement analyst and results in an effective solution for handling complex or vague  ...  requirements during the elicitation process.  ...  On the other hand Case Based Reasoning approach is used during requirement elicitation process.  ... 
doi:10.19026/rjaset.6.3442 fatcat:o7ngrr5tijbplkcvlkcxnpn4fm

Requirements Specification [chapter]

2000 Software Testing and Continuous Quality Improvement  
Description of use-case Association Use-case Use-case name Part I Requirements Elicitation Part II Requirements Analysis Part III Requirements Specification Use-case diagram for the coffee-machine  ...  III Requirements Specification 15 Use-case modelling A use-case is: "… a particular form or pattern or exemplar of usage, a scenario that begins with some user of the system initiating some  ...  Part I Requirements Elicitation Part II Requirements Analysis Part III Requirements Specification  ... 
doi:10.1201/9781420048124.axc fatcat:uhguf3u6bjddrjnwnbfja4rnkq

Requirements Specification [chapter]

1998 PDCA/Test  
Description of use-case Association Use-case Use-case name Part I Requirements Elicitation Part II Requirements Analysis Part III Requirements Specification Use-case diagram for the coffee-machine  ...  III Requirements Specification 15 Use-case modelling A use-case is: "… a particular form or pattern or exemplar of usage, a scenario that begins with some user of the system initiating some  ...  Part I Requirements Elicitation Part II Requirements Analysis Part III Requirements Specification  ... 
doi:10.1201/9781420048131.axc fatcat:iampbp3ftrgepl6kr2odyijbcq

Requirements Specification [chapter]

2008 Software Testing and Continuous Quality Improvement, Third Edition  
Description of use-case Association Use-case Use-case name Part I Requirements Elicitation Part II Requirements Analysis Part III Requirements Specification Use-case diagram for the coffee-machine  ...  III Requirements Specification 15 Use-case modelling A use-case is: "… a particular form or pattern or exemplar of usage, a scenario that begins with some user of the system initiating some  ...  Part I Requirements Elicitation Part II Requirements Analysis Part III Requirements Specification  ... 
doi:10.1201/9781439834367.axc fatcat:oaje7rryerbwll4c7ehuq535p4

requirements specification [chapter]

Martin H. Weik
2000 Computer Science and Communications Dictionary  
Description of use-case Association Use-case Use-case name Part I Requirements Elicitation Part II Requirements Analysis Part III Requirements Specification Use-case diagram for the coffee-machine  ...  III Requirements Specification 15 Use-case modelling A use-case is: "… a particular form or pattern or exemplar of usage, a scenario that begins with some user of the system initiating some  ...  Part I Requirements Elicitation Part II Requirements Analysis Part III Requirements Specification  ... 
doi:10.1007/1-4020-0613-6_16165 fatcat:wjxghhxbv5dbvgohwj65zptr3u

Towards an understanding of the Role of Design Thinking for Requirements Elicitation - Findings from a Multiple-Case Study

Jennifer Hehn, Falk Uebernickel
2018 Americas Conference on Information Systems  
Specifically, this paper presents learnings in terms of process guidance, stakeholder communication, and requirements quality based on insights from a multiple-case study.  ...  Effective requirements elicitation is perceived to be one of the most crucial activities in software-intensive development projects.  ...  We use empirical findings on challenges in requirements The Role of Design Thinking for Requirements Elicitation elicitation practices to guide the analysis of 12 cases applying Design Thinking.  ... 
dblp:conf/amcis/HehnU18 fatcat:x5nqqtmsqngozda4s25gsn5e6e

An Anti-pattern for Misuse Cases [chapter]

Mohammad Torabi Dashti, Saša Radomirović
2017 Lecture Notes in Computer Science  
Misuse case analysis is a method for the elicitation, documentation, and communication of security requirements.  ...  It builds upon the well-established use case analysis method and is one of the few existing techniques dedicated to security requirements engineering.  ...  Introduction Misuse case analysis is a method for helping requirements engineers with the notorious task of eliciting security requirements.  ... 
doi:10.1007/978-3-319-72817-9_16 fatcat:cj2si5d6hjcapl6enjbnvzy2sa
« Previous Showing results 1 — 15 out of 900,137 results