Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- posterNovember 2010
The production rule framework: developing a canonical set of software requirements for compliance with law
IHI '10: Proceedings of the 1st ACM International Health Informatics SymposiumPages 629–636https://doi.org/10.1145/1882992.1883092The cost of noncompliance, as well as lost reputation and brand damage resulting from noncompliance, makes legal compliance critical in software systems. In this paper, we present a production rule framework that software engineers can to specify ...
- ArticleOctober 2004
Specifying privacy policies with P3P and EPAL: lessons learned
WPES '04: Proceedings of the 2004 ACM workshop on Privacy in the electronic societyPage 35https://doi.org/10.1145/1029179.1029190As computing becomes more ubiquitous and Internet use continues to rise, it is increasingly important for organizations to construct accurate and effective privacy policies that document their information handling and usage practices. Most privacy ...
- research-articleFebruary 2003
Functional Paleontology: The Evolution of User-Visible System Services
IEEE Transactions on Software Engineering (ISOF), Volume 29, Issue 2Pages 151–166https://doi.org/10.1109/TSE.2003.1178053It has long been accepted that requirements analysis should precede architectural design and implementation, but in software evolution and reverse engineering this concern with black-box analysis of function has necessarily been de-emphasized in favor ...
- ArticleJuly 2001
Functional paleontology: system evolution as the user sees it
It has long been accepted that requirements analysis should precede architectural design and implementation, but in software evolution and reverse engineering this concern with black-box analysis of function has necessarily been de-emphasized in favor ...