Nome |
# |
Modeling structured and unstructured processes: An empirical evaluation, file e3835193-72d1-72ef-e053-3705fe0ad821
|
10
|
Designing Secure Socio-Technical Systems with STS-ml, file e3835192-2e26-72ef-e053-3705fe0ad821
|
8
|
Exploiting Contextual and Social Variability for Software Adaptation, file 77009466-7c3d-4076-9b36-1cec2f828024
|
7
|
Security Requirements Engineering via Commitments, file 2a6b532a-451c-4e78-b3fc-ac080411267b
|
5
|
Talos: An Architecture for Self-Configuration, file 30af73a5-4bcd-4a1f-bc7a-fe61bc07cd8a
|
5
|
Modeling and Reasoning about Service-Oriented Applications via Goals and Commitments, file d92c210b-c405-4acd-a4e4-2b92dd38498a
|
5
|
Modeling and Reasoning about Service-Oriented Applications via Goals and Commitments, file 7c9e94bf-de06-4393-8ba0-3e45d3ef1375
|
4
|
Reasoning about Contextual Requirements for Mobile Information Systems: a Goal-based Approach, file 8e69ed0e-830e-43d1-98a7-913c4385c609
|
4
|
Specifying Business Processes with Azzurra, file a2c5de8b-e8c4-4ffb-a294-d751a4b7a7bc
|
4
|
An Architecture for Requirements-driven Self-reconfiguration, file bdb40207-6917-480e-8c19-cabf55405460
|
4
|
Identifying Conflicts in Security Requirements with STS-ml, file dbd9107e-9ac1-4371-80f2-fdeff86738b5
|
4
|
A NFR-based Framework for User-Centered Adaptation, file e0997f12-874d-4ddb-af9d-0d37a37c6f6a
|
4
|
Modeling Business Processes with Azzurra: Order Fulfilment, file 44f2ae00-1761-4733-80b8-84631efe97d1
|
3
|
A Goal-based Framework for Contextual Requirements Modeling and Analysis, file 56988e3d-bda9-47db-9da3-45aaafdcba1c
|
3
|
Location-based Modeling and Analysis: Tropos-based Approach, file bc95f8c5-6b0e-4771-b227-99ac67ff3a34
|
3
|
Security and Trustworthiness Threats To Composite Services: Taxonomy, Countermeasures, And Research Directions, file e3835192-2c85-72ef-e053-3705fe0ad821
|
3
|
Requirements-Driven Deployment: Customizing the Requirements Model for the Host Environment, file e3835192-3530-72ef-e053-3705fe0ad821
|
3
|
Contextual Goal Models, file f84303fa-9667-4d3b-ac63-82779d22beaa
|
3
|
A Goal-based Framework for Contextual Requirements Modeling and Analysis, file 436072f0-bb7c-44bf-82a4-472391fe519e
|
2
|
TBIM: A Language for Modeling and Reasoning about Business Plans, file cf7d51b3-59aa-47d6-965e-e5e7f2794b3d
|
2
|
STS-Tool: Security Requirements Engineering for Socio-Technical Systems, file e3835192-2c80-72ef-e053-3705fe0ad821
|
2
|
Threat Analysis in Goal-Oriented Security Requirements Modelling, file e3835192-2c89-72ef-e053-3705fe0ad821
|
2
|
Managing Security Requirements Conflicts in Socio-Technical Systems, file e3835192-2cf1-72ef-e053-3705fe0ad821
|
2
|
Exploring Alternative Designs of Socio-Technical Systems, file e3835192-2d9b-72ef-e053-3705fe0ad821
|
2
|
Modeling and Verifying Security Policies in Business Processes, file e3835192-2e20-72ef-e053-3705fe0ad821
|
2
|
Protos: Foundations for Engineering Innovative Socio-Technical Systems, file e3835192-2e22-72ef-e053-3705fe0ad821
|
2
|
Specifying and Reasoning over Socio-Technical Security Requirements with STS-Tool, file e3835192-2e8a-72ef-e053-3705fe0ad821
|
2
|
Designing secure business processes with SecBPMN, file e3835193-6f52-72ef-e053-3705fe0ad821
|
2
|
The next release problem revisited: A new avenue for goal models, file e3835195-3a08-72ef-e053-3705fe0ad821
|
2
|
Social specifications of business processes with Azzurra, file e3835197-52bb-72ef-e053-3705fe0ad821
|
2
|
Location-based Variability for Mobile Information Systems, file 4e6801ff-b081-47b9-8c60-a8427fb38441
|
1
|
Modelling and reasoning about security requirements in socio-technical systems, file e3835192-1ffa-72ef-e053-3705fe0ad821
|
1
|
Modelling Security Requirements in Socio-Technical Systems with STS-Tool, file e3835192-2cf5-72ef-e053-3705fe0ad821
|
1
|
Security requirements engineering via commitments, file e3835192-2d5c-72ef-e053-3705fe0ad821
|
1
|
Requirements Evolution: from Assumptions to Reality, file e3835192-2d68-72ef-e053-3705fe0ad821
|
1
|
The Socio-technical Security Requirements Modelling Language for Secure Composite Services, file e3835192-2e14-72ef-e053-3705fe0ad821
|
1
|
Security requirements engineering with STS-Tool, file e3835192-2e18-72ef-e053-3705fe0ad821
|
1
|
STS-Tool: Specifying and Reasoning over Socio-Technical Security Requirements, file e3835192-2e2a-72ef-e053-3705fe0ad821
|
1
|
STS-Tool: Socio-Technical Security Requirements through Social Commitments, file e3835192-2e96-72ef-e053-3705fe0ad821
|
1
|
Security Requirements Engineering for Service-Oriented Applications, file e3835192-2efc-72ef-e053-3705fe0ad821
|
1
|
From Intentions to Social Commitments: Adaptation in Multiagent Systems, file e3835192-2f04-72ef-e053-3705fe0ad821
|
1
|
Formative User-Centered Evaluation of Security Modeling: Results from a Case Study, file e3835192-3532-72ef-e053-3705fe0ad821
|
1
|
Aligning Service-Oriented Architectures with Security Requirements, file e3835192-3536-72ef-e053-3705fe0ad821
|
1
|
Reasoning with contextual requirements: Detecting inconsistency and conflicts, file e3835192-8e5a-72ef-e053-3705fe0ad821
|
1
|
Adaptive Socio-Technical Systems: a Requirements-driven Approach, file e3835192-8e94-72ef-e053-3705fe0ad821
|
1
|
Totale |
121 |