By search term

By author

Articles

Showing 9 articles tagged with ReqIF, Reuse, Security or SysML [max. 4 tags]

  • Methods
Discovering System Requirements through SysML
An application of the IREB Handbook of Requirements Modeling
  • Methods
  • Practice
Modeling Requirements and Context as a means for Automated Requirements Validation
An Example from the Automation Industry
  • Methods
Modeling Requirements with SysML
How modeling can be useful to better define and trace requirements
  • Methods
Opportunities & Approaches
Re-Use of Requirements via Libraries:
Opportunities & Approaches
  • Practice
  • Methods
Cyber Security Requirements Engineering
Hands-on guidance for developing and managing security requirements
  • Practice
Building in security instead of testing it in
Eliciting security requirements needs a different process
  • Practice
  • Cross-discipline
Mission Possible
Concept for the successful handling of integral NFRs in Scaled Agile Environments.
  • Practice
Open Up
How the ReqIF Standard for Requirements Exchange Disrupts the Tool Market.
  • Studies and Research
Requirements Reuse
Requirements Reuse with the PABRE Framework
Title Topic Author Date Reading time

Discovering System Requirements through SysML

Methods
9 minutes

Modeling Requirements and Context as a means for Automated Requirements Validation

Methods Practice
27 minutes

Modeling Requirements with SysML

Methods
13 minutes

Opportunities & Approaches

Methods
9 minutes

Cyber Security Requirements Engineering

Practice Methods
14 minutes

Building in security instead of testing it in

Practice
14 minutes

Mission Possible

Practice Cross-discipline
11 minutes

Open Up

Practice
21 minutes

Requirements Reuse

Studies and Research
22 minutes