By search term

By author

Articles

Showing 10 articles tagged with Attributes, Reuse or Security

  • Methods
  • Practice
Innovation Arena
An agile and collaborative prioritization technique
  • Practice
  • Cross-discipline
Mission Possible
Concept for the successful handling of integral NFRs in Scaled Agile Environments.
  • Practice
Open Up
How the ReqIF Standard for Requirements Exchange Disrupts the Tool Market.
  • Methods
  • Practice
IT Requirements when Buying, not Making
Effective specifications to select off-the-shelf software
  • Methods
Opportunities & Approaches
Re-Use of Requirements via Libraries:
Opportunities & Approaches
  • Methods
Automated Quality Assurance
Automated Quality Assurance of Software Requirements. The following contribution deals with the automated assurance of software requirements quality.
  • Methods
  • Practice
Why and when must requirement engineers pay attention to the GDPR? | Part 1
Neglecting personal data protection is not an option
  • Practice
Building in security instead of testing it in
Eliciting security requirements needs a different process
  • Studies and Research
Requirements Reuse
Requirements Reuse with the PABRE Framework
  • Practice
  • Methods
Cyber Security Requirements Engineering
Hands-on guidance for developing and managing security requirements
Title Topic Author Date Reading time

Innovation Arena

Methods Practice
32 minutes

Mission Possible

Practice Cross-discipline
11 minutes

Open Up

Practice
21 minutes

IT Requirements when Buying, not Making

Methods Practice
31 minutes

Opportunities & Approaches

Methods
9 minutes

Automated Quality Assurance

Methods
21 minutes

Why and when must requirement engineers pay attention to the GDPR? | Part 1

Methods Practice
9 minutes

Building in security instead of testing it in

Practice
14 minutes

Requirements Reuse

Studies and Research
22 minutes

Cyber Security Requirements Engineering

Practice Methods
14 minutes