Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 6 of 6 matches in All Departments
This book constitutes the proceedings of the 24th International Working Conference on Requirements Engineering - Foundation for Software Quality, REFSQ 2018, held in Utrecht, The Netherlands, in March 2018. The 23 full and 2 invited talks papers presented in this volume were carefully reviewed and selected from 57 submissions. The papers were organized in topical sections named: RE in Industrial Practice; NLP in Theory and Practice; Empirical Insights into Traceability; Taming Ambiguity; Large-Scale RE; Quality Requirements; User and Job Stories; Requirements Alignment; RE Previews and Visions; Big Data; Mindmapping and Requirements Modeling.
This book constitutes the refereed proceedings of the Second International Workshop on Engineering Multi-Agent Systems, EMAS 2014, held in Paris, France, in May 2014. The 22 full papers were carefully reviewed and selected from 41 submissions. The focus of the papers is on following topics: intelligent agents, multi-agent systems, software design engineering, model-driven software engineering, reasoning about belief and knowledge, cooperation and coordination, constraint and logic programming, software verification, design patterns.
This book constitutes the proceedings of the 27th International Working Conference on Requirements Engineering - Foundation for Software Quality, REFSQ 2021, which was due to be held in Essen, Germany, in April 2021. Due to the COVID-19 pandemic the conference was held virtually in April 2021. The special focus of this year`s REFSQ 2021 conference are contributions emphasizing the importance of human values, such as privacy and fairness, when designing software-intensive systems as well as the challenges that intelligent and autonomous systems pose due to the tight interplay with humans.
This book constitutes the proceedings of the 14th International Conference on Research Challenges in Information Sciences, RCIS 2020, held in Limassol, Cyprus, during September 23-25, 2020. The conference was originally scheduled for May 2020, but the organizing committee was forced to postpone the conference due to the outbreak of the COVID-19 pandemic. The scope of RCIS 2020 is summarized by the thematic areas of information systems and their engineering; user-oriented approaches; data and information management; business process management; domain-specific information systems engineering; data science; information infrastructures, and reflective research and practice. The 26 full papers and 3 work in progress papers presented in this volume were carefully reviewed and selected from 106 submissions. They were organized in topical sections named: Data Analytics and Business Intelligence; Digital Enterprise and Technologies; Human Factors in Information Systems; Information Systems Development and Testing; Machine Learning and Text Processing; and Security and Privacy. The volume also contains 12 poster and demo-papers, and 4 Doctoral Consortium papers.
A novel, model-driven approach to security requirements engineering that focuses on socio-technical systems rather than merely technical systems. Security requirements engineering is especially challenging because designers must consider not just the software under design but also interactions among people, organizations, hardware, and software. Taking this broader perspective means designing a secure socio-technical system rather than a merely technical system. This book presents a novel, model-driven approach to designing secure socio-technical systems. It introduces the Socio-Technical Modeling Language (STS-ML) and presents a freely available software tool, STS-Tool, that supports this design approach through graphical modeling, automated reasoning capabilities to verify the models constructed, and the automatic derivation of security requirements documents. After an introduction to security requirements engineering and an overview of computer and information security, the book presents the STS-ML modeling language, introducing the modeling concepts used, explaining how to use STS-ML within the STS method for security requirements, and providing guidelines for the creation of models. The book then puts the STS approach into practice, introducing the STS-Tool and presenting two case studies from industry: an online collaborative platform and an e-Government system. Finally, the book considers other methods that can be used in conjunction with the STS method or that constitute an alternative to it. The book is suitable for course use or as a reference for practitioners. Exercises, review questions, and problems appear at the end of each chapter.
The Future Internet envisions a move toward widespread use of services as a way of networked interaction. However, while the technologies for developing and deploying services are well established, methods for ensuring trust and security are fewer and less mature. Lack of trust and confidence in composed services and in their constituent parts is reckoned to be one of the significant factors limiting widespread uptake of service-oriented computing. This state-of-the-art survey illustrates the results of the Aniketos - Secure and Trustworthy Composite Services - project (funded under the EU 7th Research Framework Programme). The papers included in the book describe the solutions developed during the 4-year project to establish and maintain trustworthiness and secure behavior in a constantly changing service environment. They provide service developers and providers with a secure service development framework that includes methods, tools, and security services supporting the design-time creation and run-time composition of secure dynamic services, where both the services and the threats are evolving. The 16 chapters are organized in the following thematic sections: state of the art of secure and trustworthy composite services; the Aniketos platform; design-time support framework; run-time support framework; and case studies and evaluation.
|
You may like...
|