Dear Miguel Solinas,
Your paper, entitled "Embedding Security Patterns into a Domain Model", has been successfully submitted to the CPS Online system for DEXA 2009. Thank you!
I will contact you if there are any problems.
Best regards,
Bob Werner
CPS Editor, Conference Publishing Services (CPS)
IEEE Computer Society www.computer.org
jueves, 28 de mayo de 2009
Exploring how to use scenarios to discover requirements
Abstract: This paper investigates the effectiveness of different uses of scenarios on requirements discovery using results from requirements processes in two projects. The first specified requirements on a new aircraft management system at a regional UK airport to reduce its environmental impact. The second specified new work-based learning tools to be adopted by a consortium of organizations. In both projects scenarios were walked through both in facilitated workshops and in the stakeholders’ workplaces using different forms of a scenario tool. In the second project, scenarios were also walked through with a software prototype and creativity prompts. Results revealed both qualitative and quantitative differences in discovered requirements that have potential implications for models of scenario-based requirements
discovery and the design of scenario tools. PDF.
discovery and the design of scenario tools. PDF.
martes, 19 de mayo de 2009
CNIT2009
Estimado Miguel Solinas:
¡Felicitaciones!, su trabajo "Embebiendo Patrones de Seguridad en Etapas Tempranas del Proceso de Desarrollo de Software", ha sido aceptado para ser presentado en Información y Comunicación para la Sociedad del Conocimiento que tendrá lugar el 16/06/2009 en CORDOBA,
Argentina.
La Modalidad de presentación será Exposición en conferencia.
¡Felicitaciones!, su trabajo "Embebiendo Patrones de Seguridad en Etapas Tempranas del Proceso de Desarrollo de Software", ha sido aceptado para ser presentado en Información y Comunicación para la Sociedad del Conocimiento que tendrá lugar el 16/06/2009 en CORDOBA,
Argentina.
La Modalidad de presentación será Exposición en conferencia.
jueves, 14 de mayo de 2009
Information and Software Technology
Volume 51, Issue 5, Pages 809-956 (May 2009)
SPECIAL ISSUE: Model-Driven Development for Secure Information Systems
Edited by Eduardo Fernández-Medina, Jan Jurjens, Juan Trujillo and Sushil Jajodia
SPECIAL ISSUE: Model-Driven Development for Secure Information Systems
Edited by Eduardo Fernández-Medina, Jan Jurjens, Juan Trujillo and Sushil Jajodia
martes, 12 de mayo de 2009
BECA FINALIZACION - SECYT-UNC
Señor/a Profesor/a, me dirijo a Ud. conforme lo solicitado por el Prof. Aarón Saal, Subsecretario de Ciencia y Tecnología de esta Universidad, para poner en su conocimiento que ha sido seleccionado para otorgarle una Beca para Finalización de Maestrías y Doctorados - Convocatoria 2008. Por favor pase por esta Secretaría lo antes posible, a fin de completar los trámites administrativos correspondientes, para solicitar la designación.
Atentamente.
Nora SMITH
SECyT-UNC
Atentamente.
Nora SMITH
SECyT-UNC
viernes, 8 de mayo de 2009
Embedding Security Patterns into a Model Domain
Dear Miguel Solinas
We are glad to inform you that your paper entitled "Embedding Security Patterns into a Model Domain" has been accepted for inclusion in the DEXA/TrustBus 2009 proceedings published by IEEE Computer Society...
Best regards and see you in Linz,
Eduardo B. Fernandez and Guenther Pernul
(SPattern '09 chairs)
We are glad to inform you that your paper entitled "Embedding Security Patterns into a Model Domain" has been accepted for inclusion in the DEXA/TrustBus 2009 proceedings published by IEEE Computer Society...
Best regards and see you in Linz,
Eduardo B. Fernandez and Guenther Pernul
(SPattern '09 chairs)
Suscribirse a:
Comentarios (Atom)