2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS) 2015
DOI: 10.1109/models.2015.7338264
|View full text |Cite
|
Sign up to set email alerts
|

Integrating goal-oriented and use case-based requirements engineering: The missing link

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0
2

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 11 publications
0
1
0
2
Order By: Relevance
“…Here, threats are defined by looking into the possibilities of spoofing identity, tampering with data, repudiation, information leakage, denial of services [221], and elevation in the given situation. The authors in [222] explain that numerous security approaches have been developed to assist the software engineers in evaluating security risks, such approaches include Attack Trees, combining goal-orientation and use-case modeling (an effective method of software requirement engineering) [223] and Secure Tropos (a security-oriented extension to the goal-driven requirements engineering methodology) [224]. Other approaches allow the software engineers to address these risks by reusing design decisions [225] or sustaining the decision making process [226].…”
Section: Approaches To Software Quality and Securitymentioning
confidence: 99%
“…Here, threats are defined by looking into the possibilities of spoofing identity, tampering with data, repudiation, information leakage, denial of services [221], and elevation in the given situation. The authors in [222] explain that numerous security approaches have been developed to assist the software engineers in evaluating security risks, such approaches include Attack Trees, combining goal-orientation and use-case modeling (an effective method of software requirement engineering) [223] and Secure Tropos (a security-oriented extension to the goal-driven requirements engineering methodology) [224]. Other approaches allow the software engineers to address these risks by reusing design decisions [225] or sustaining the decision making process [226].…”
Section: Approaches To Software Quality and Securitymentioning
confidence: 99%
“…UCMeta [Yue et al 2015], UML Extended [Misbhauddin and Alshayeb 2015], GUIMeta [Nguyen et al 2015], URN, estendido no TimedURN [Aprajita et al 2017] e o PUM [Hajri et al 2015]. Destes modelos foi avaliado o escopo da representação, eliminando o PUM, que tem o foco em linha de produto (já que não se desejava um metamodelo de domínio específico).…”
Section: Na Revisão Bibliográfica Foram Encontrados 5 Metamodelosunclassified
“…Nele foram aplicados conceitos da Engenharia Dirigida por Modelos (Model Driven Engineering, MDE) para apresentar uma proposta de sintaxe concreta para uma representação de requisitos: o caso de uso. A sintaxe concretaé baseada em uma semântica e sintaxe abstrata já existentes [Nguyen et al 2015] eé capaz de representar casos de uso típicos de uma forma padronizada em uma ferramenta, denominada UCWriter, desenvolvida como um dos resultados desta pesquisa.…”
Section: Introductionunclassified