|
Showing 1 - 6 of
6 matches in All Departments
|
Requirements Engineering: Foundation for Software Quality - 24th International Working Conference, REFSQ 2018, Utrecht, The Netherlands, March 19-22, 2018, Proceedings (Paperback, 1st ed. 2018)
Erik Kamsties, Jennifer Horkoff, Fabiano Dalpiaz
|
R1,586
Discovery Miles 15 860
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the 24th International
Working Conference on Requirements Engineering - Foundation for
Software Quality, REFSQ 2018, held in Utrecht, The Netherlands, in
March 2018. The 23 full and 2 invited talks papers presented in
this volume were carefully reviewed and selected from 57
submissions. The papers were organized in topical sections named:
RE in Industrial Practice; NLP in Theory and Practice; Empirical
Insights into Traceability; Taming Ambiguity; Large-Scale RE;
Quality Requirements; User and Job Stories; Requirements Alignment;
RE Previews and Visions; Big Data; Mindmapping and Requirements
Modeling.
|
Engineering Multi-Agent Systems - Second International Workshop, EMAS 2014, Paris, France, May 5-6, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Fabiano Dalpiaz, Jurgen Dix, M. Birna van Riemsdijk
|
R2,938
Discovery Miles 29 380
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the Second
International Workshop on Engineering Multi-Agent Systems, EMAS
2014, held in Paris, France, in May 2014. The 22 full papers were
carefully reviewed and selected from 41 submissions. The focus of
the papers is on following topics: intelligent agents, multi-agent
systems, software design engineering, model-driven software
engineering, reasoning about belief and knowledge, cooperation and
coordination, constraint and logic programming, software
verification, design patterns.
This book constitutes the proceedings of the 27th International
Working Conference on Requirements Engineering - Foundation for
Software Quality, REFSQ 2021, which was due to be held in Essen,
Germany, in April 2021. Due to the COVID-19 pandemic the conference
was held virtually in April 2021. The special focus of this year`s
REFSQ 2021 conference are contributions emphasizing the importance
of human values, such as privacy and fairness, when designing
software-intensive systems as well as the challenges that
intelligent and autonomous systems pose due to the tight interplay
with humans.
|
Research Challenges in Information Science - 14th International Conference, RCIS 2020, Limassol, Cyprus, September 23-25, 2020, Proceedings (Paperback, 1st ed. 2020)
Fabiano Dalpiaz, Jelena Zdravkovic, Pericles Loucopoulos
|
R1,678
Discovery Miles 16 780
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the 14th International
Conference on Research Challenges in Information Sciences, RCIS
2020, held in Limassol, Cyprus, during September 23-25, 2020. The
conference was originally scheduled for May 2020, but the
organizing committee was forced to postpone the conference due to
the outbreak of the COVID-19 pandemic. The scope of RCIS 2020 is
summarized by the thematic areas of information systems and their
engineering; user-oriented approaches; data and information
management; business process management; domain-specific
information systems engineering; data science; information
infrastructures, and reflective research and practice. The 26 full
papers and 3 work in progress papers presented in this volume were
carefully reviewed and selected from 106 submissions. They were
organized in topical sections named: Data Analytics and Business
Intelligence; Digital Enterprise and Technologies; Human Factors in
Information Systems; Information Systems Development and Testing;
Machine Learning and Text Processing; and Security and Privacy. The
volume also contains 12 poster and demo-papers, and 4 Doctoral
Consortium papers.
The Future Internet envisions a move toward widespread use of
services as a way of networked interaction. However, while the
technologies for developing and deploying services are well
established, methods for ensuring trust and security are fewer and
less mature. Lack of trust and confidence in composed services and
in their constituent parts is reckoned to be one of the significant
factors limiting widespread uptake of service-oriented computing.
This state-of-the-art survey illustrates the results of the
Aniketos - Secure and Trustworthy Composite Services - project
(funded under the EU 7th Research Framework Programme). The papers
included in the book describe the solutions developed during the
4-year project to establish and maintain trustworthiness and secure
behavior in a constantly changing service environment. They provide
service developers and providers with a secure service development
framework that includes methods, tools, and security services
supporting the design-time creation and run-time composition of
secure dynamic services, where both the services and the threats
are evolving. The 16 chapters are organized in the following
thematic sections: state of the art of secure and trustworthy
composite services; the Aniketos platform; design-time support
framework; run-time support framework; and case studies and
evaluation.
A novel, model-driven approach to security requirements engineering
that focuses on socio-technical systems rather than merely
technical systems. Security requirements engineering is especially
challenging because designers must consider not just the software
under design but also interactions among people, organizations,
hardware, and software. Taking this broader perspective means
designing a secure socio-technical system rather than a merely
technical system. This book presents a novel, model-driven approach
to designing secure socio-technical systems. It introduces the
Socio-Technical Modeling Language (STS-ML) and presents a freely
available software tool, STS-Tool, that supports this design
approach through graphical modeling, automated reasoning
capabilities to verify the models constructed, and the automatic
derivation of security requirements documents. After an
introduction to security requirements engineering and an overview
of computer and information security, the book presents the STS-ML
modeling language, introducing the modeling concepts used,
explaining how to use STS-ML within the STS method for security
requirements, and providing guidelines for the creation of models.
The book then puts the STS approach into practice, introducing the
STS-Tool and presenting two case studies from industry: an online
collaborative platform and an e-Government system. Finally, the
book considers other methods that can be used in conjunction with
the STS method or that constitute an alternative to it. The book is
suitable for course use or as a reference for practitioners.
Exercises, review questions, and problems appear at the end of each
chapter.
|
|