Social Modeling and i*

ES Yu - … modeling: Foundations and applications: Essays in …, 2009 - Springer
Many different types of models are used in various scientific and engineering fields,
reflecting the subject matter and the kinds of understanding that is sought in each field …

[PDF][PDF] Goal-oriented requirements engineering: An overview of the current research

A Lapouchnian - University of Toronto, 2005 - edisciplinas.usp.br
The main measure of the success of a software system is the degree to which it meets its
purpose. Therefore, identifying this purpose must be one of the main activities in the …

Feature selection for clustering-a filter solution

M Dash, K Choi, P Scheuermann… - 2002 IEEE International …, 2002 - ieeexplore.ieee.org
Processing applications with a large number of dimensions has been a challenge for the
KDD community. Feature selection, an effective dimensionality reduction technique, is an …

Security and privacy requirements analysis within a social setting

L Liu, E Yu, J Mylopoulos - Proceedings. 11th IEEE …, 2003 - ieeexplore.ieee.org
Security issues for software systems ultimately concern relationships among social actors
stakeholders, system users, potential attackers-and the software acting on their behalf. We …

A comparison of security requirements engineering methods

B Fabian, S Gürses, M Heisel, T Santen… - Requirements …, 2010 - Springer
This paper presents a conceptual framework for security engineering, with a strong focus on
security requirements elicitation and analysis. This conceptual framework establishes a …

Ontologies for knowledge management: an information systems perspective

I Jurisica, J Mylopoulos, E Yu - Knowledge and Information systems, 2004 - Springer
Abstract Knowledge management research focuses on concepts, methods, and tools
supporting the management of human knowledge. The main objective of this paper is to …

From requirements to code with PASSI methodology

M Cossentino - Agent-oriented methodologies, 2005 - igi-global.com
Abstract A Process for Agent Societies Specification and Implementation (PASSI) is a step-
by-step requirement-to-code methodology for designing and developing multi-agent …

Reusable knowledge in security requirements engineering: a systematic mapping study

A Souag, R Mazo, C Salinesi… - Requirements …, 2016 - Springer
Security is a concern that must be taken into consideration starting from the early stages of
system development. Over the last two decades, researchers and engineers have …

[PDF][PDF] Designing a multi-agent solution for a bookstore with the PASSI methodology.

P Burrafato, M Cossentino - AOIS@ CAiSE, 2002 - pa.icar.cnr.it
PASSI (a Process for Agent Societies Specification and Implementation) is a step-by-step
requirement-to-code methodology for designing and developing multi-agent societies …

Deriving security requirements from crosscutting threat descriptions

CB Haley, RC Laney, B Nuseibeh - Proceedings of the 3rd international …, 2004 - dl.acm.org
It is generally accepted that early determination of the stakeholder requirements assists in
the development of systems that better meet the needs of those stakeholders. General …