GOSSEC: Goal Oriented Software Sustainability Evaluation Criteria
نویسندگان
چکیده
منابع مشابه
Criteria for Software Testing Tool Evaluation – A Task Oriented View
Considering the immense variety of test tools available, both commercial and open source, an extensive evaluation of these tools with respect to their adequacy for a given organizational or project context seems to be impossible. On this account we present a systematic approach for deriving easily verifiable evaluation criteria for test tools. We define both, quality criteria and functional cri...
متن کاملA Goal-Oriented Software Testing Methodology
Goal-oriented requirements engineering methodologies have been investigated for more than a decade, aiming at better supporting requirements engineering. They help elicit users’ requirements, deal with stakeholders’ goals and strategic dependencies among them. Moreover, they allow representing alternative solutions so that stakeholders and developers can negotiate and choose the one that meets ...
متن کاملGoal-oriented Composition of Software Process Patterns
The development of high-quality software or software-intensive systems requires custom-tailored process models that fit the organizational and project goals as well as the development contexts. These models are a necessary prerequisite for creating project plans that are expected to fulfill business goals. Although project planners require individual process models custom-tailored to their cons...
متن کاملGoal-oriented customization of software cockpits
Software Cockpits, also known as Software Project Control Centers, support the management and controlling of software and system development projects and provide means for quantitative, measurement-based project control. Currently, many companies are developing simple control dashboards that are mainly based on Spreadsheet applications. Alternatively, they use solutions providing a fixed set of...
متن کاملA Goal-Oriented Approach to Software Obfuscation
Various software obfuscation techniques have been proposed. However, there are few discussions on proper use of these obfuscations against imaginable threats. An ad-hoc use of obfuscations cannot guarantee that a program is sufficiently protected. For a systematic use of obfuscations and the verification of the result, this paper proposes a goal oriented approach to obfuscation. Specifically, w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences
سال: 2019
ISSN: 2312-8135,1992-0652
DOI: 10.29196/jubpas.v27i1.2196