RE 2012 Workshops
RE 2012 Workshops
Powered by
Conference Publishing Consulting

2012 Second IEEE International Workshop on Requirements Patterns (RePa), September 24, 2012, Chicago, Illinois, USA

RePa 2012 – Proceedings

Contents - Abstracts - Authors

Second IEEE International Workshop on Requirements Patterns (RePa)

Title Page
Foreword

Pattern Papers

A Catalogue of Non-technical Requirement Patterns
Cristina Palomares, Carme Quer, Xavier Franch, Cindy Guerlain, and Samuel Renault
(Universitat Politècnica de Catalunya, Spain; CRP Henri Tudor, Luxembourg)
Towards Trust-Based Software Requirement Patterns
Axel Hoffmann, Matthias Söllner, Holger Hoffmann, and Jan Marco Leimeister
(Kassel University, Germany)
Requirements Patterns for Seismology Software Applications
Yang Li, Christian Pelties, Martin Käser, and Nitesh Narayan
(TU Munich, Germany; LMU Munich, Germany; Munich Re, Germany)
Early Security Patterns: A Collection of Constraints to Describe Regulatory Security Requirements
Robin A. Gandhi and Mariam Rahmani
(University of Nebraska at Omaha, USA)
Using Norm Analysis Patterns for Automated Requirements Validation
Richa Sharma and K. K. Biswas
(IIT Delhi, India)

Technical Papers

Security Requirements Patterns: Understanding the Science Behind the Art of Pattern Writing
Maria Riaz and Laurie Williams
(North Carolina State University, USA)
Using the Goal-Oriented Pattern Family Framework for Modelling Outcome-Based Regulations
Saeed Ahmadi Behnam, Daniel Amyot, Gunter Mussbacher, Edna Braun, Nick Cartwright, and Mario Saucier
(University of Ottawa, Canada; Carleton University, Canada; Transport Canada, Canada)
Towards a Framework for Pattern Experimentation: Understanding Empirical Validity in Requirements Engineering Patterns
Travis D. Breaux, Hanan Hibshi, Ashwini Rao, and Jean-Michel Lehker
(CMU, USA; University of Texas at San Antonio, USA)
Characterizations and Boundaries of Security Requirements Patterns
Rocky Slavin, Hui Shen, and Jianwei Niu
(University of Texas at San Antonio, USA)
Pattern-Based Security Requirements Specification Using Ontologies and Boilerplates
Olawande Daramola, Guttorm Sindre, and Tor Stålhane
(NTNU, Norway; Covenant University, Nigeria)

proc time: 0.01