It is concerned with the elicitation of stake-holders goals, the elaboration of these goals into requirements on the software behavior, and the assignment of responsibilities for these requirements to agents . Inadequacy in the execution of any of these RE subtasks inevitably leads to development problems which are often difficult and costly to repair. This […]
Idealized security requirements: impersonation, collusion, and privacy breaching
The conventional model of social networks, users select their contacts from a set of off-line acquaintances. Despite their utility, these conventional networks support only a subset of social networking: two users will only be able to establish a relationship in the social network if they , or are introduced to each other. One more Encounter […]