Requirements elicitation: Towards the unknown unknowns

A Sutcliffe, P Sawyer - 2013 21st IEEE International …, 2013 - ieeexplore.ieee.org
Requirements elicitation research is reviewed using a framework categorising the
relativeknowness' of requirements specification and Common Ground discourse theory. The …

Comparing alternatives for analyzing requirements trade-offs–In the absence of numerical data

G Elahi, E Yu - Information and Software Technology, 2012 - Elsevier
CONTEXT: Choosing a design solution most often involves dealing with trade-offs and
conflicts among requirements and design objectives. Making such trade-offs during early …

Information visualization for selection in Design by Shopping

A Abi Akle, S Minel, B Yannou - Research in Engineering Design, 2017 - Springer
Abstract In Design by Shopping, designers explore the design space to gain an insight into
trades, and feasible and impractical solutions, as well as to learn about alternatives before …

RCDA: Architecting as a risk-and cost management discipline

ER Poort, H Van Vliet - Journal of Systems and Software, 2012 - Elsevier
We propose to view architecting as a risk-and cost management discipline. This point of
view helps architects identify the key concerns to address in their decision making, by …

Automating trade-off analysis of security requirements

L Pasquale, P Spoletini, M Salehie, L Cavallaro… - Requirements …, 2016 - Springer
A key aspect of engineering secure systems is identifying adequate security requirements to
protect critical assets from harm. However, security requirements may compete with other …

Identifying safety issues from energy conservation requirements

K Madala, H Do, B Tenbergen - Journal of Software: Evolution …, 2023 - Wiley Online Library
In cyber‐physical systems such as robots and automated vehicles that rely heavily on
batteries, safety, and energy conservation can result conflicting requirements when not …

Security risk management by qualitative vulnerability analysis

G Elahi, E Yu, N Zannone - 2011 Third International Workshop …, 2011 - ieeexplore.ieee.org
Security risk assessment in the requirements phase is challenging because risk factors,
such as probability and damage of attacks, are not always numerically measurable or …

Appraisal and reporting of security assurance at operational systems level

M Ouedraogo, D Khadraoui, H Mouratidis… - Journal of Systems and …, 2012 - Elsevier
In this paper we discuss the issues relating the evaluation and reporting of security
assurance of runtime systems. We first highlight the shortcomings of current initiatives in …

Requirements trade-offs analysis in the absence of quantitative measures: A heuristic method

G Elahi, E Yu - Proceedings of the 2011 ACM Symposium on Applied …, 2011 - dl.acm.org
Simultaneously satisfying multiple interacting and possibly conflicting software requirements
is challenging. Quantitative cost-benefit analysis of alternative solutions is often hard or …

Selecting security mechanisms in secure tropos

M Pavlidis, H Mouratidis, E Panaousis… - Trust, Privacy and …, 2017 - Springer
As security is a growing concern for modern information systems, Security Requirements
Engineering has been developed as a very active area of research. A large body of work …