By search term

By author

Articles

Showing 8 articles tagged with Security or Verification

  • Methods
  • Practice
A key technique
Delegation of requirement verification. A key technique for more mature requirements management.
  • Methods
Advance
Verification and Validation of System Requirements by Animation and Automated Formal Analysis.
  • Practice
Building in security instead of testing it in
Eliciting security requirements needs a different process
  • Practice
  • Methods
Cyber Security Requirements Engineering
Hands-on guidance for developing and managing security requirements
  • Practice
  • Cross-discipline
Mission Possible
Concept for the successful handling of integral NFRs in Scaled Agile Environments.
  • Methods
  • Practice
Modeling Requirements and Context as a means for Automated Requirements Validation
An Example from the Automation Industry
  • Methods
Rigorous Verification
A new approach for requirements validation and rigorous verification.
  • Practice
  • Methods
The Potential of User Tests for Requirements Engineering
It seems evident to test designs or prototypes of software with end-users. But what about requirements?
Title Topic Author Date Reading time

A key technique

Methods Practice
9 minutes

Advance

Methods
24 minutes

Building in security instead of testing it in

Practice
14 minutes

Cyber Security Requirements Engineering

Practice Methods
14 minutes

Mission Possible

Practice Cross-discipline
11 minutes

Modeling Requirements and Context as a means for Automated Requirements Validation

Methods Practice
27 minutes

Rigorous Verification

Methods
16 minutes

The Potential of User Tests for Requirements Engineering

Practice Methods
11 minutes