Journal: Requir. Eng.

Volume 15, Issue 4

359 -- 373Christian Wolter, Christoph Meinel. An approach to capture authorisation requirements in business processes
375 -- 396Chen Li, Marjan van den Akker, Sjaak Brinkkemper, Guido Diepen. An integrated approach for requirement selection and scheduling in software release planning
397 -- 417Gabriela N. Aranda, Aurora Vizcaíno, Mario Piattini. A framework to improve communication during the requirements elicitation process in GSD projects
419 -- 437Israel Navarro, Nancy G. Leveson, Kristina Lundqvist. Semantic decoupling: reducing the impact of requirement changes
439 -- 458Raian Ali, Fabiano Dalpiaz, Paolo Giorgini. A goal-based framework for contextual requirements modeling and analysis

Volume 15, Issue 3

267 -- 283Rubén Fuentes-Fernández, Jorge J. Gómez-Sanz, Juan Pavón. Understanding the human context in requirements elicitation
285 -- 306Mohamed El-Attar, James Miller. Developing comprehensive acceptance tests from use cases and robustness diagrams
307 -- 311Hermann Kaindl, Davor Svetinovic. On confusion between requirements and their representations
313 -- 335Senthil Karthikeyan Sundaram, Jane Huffman Hayes, Alex Dekhtyar, Elizabeth Ashlee Holbrook. Assessing traceability of software engineering artifacts
337 -- 358Jim McElroy, Günther Ruhe. When-to-release decisions for features with time-dependent value functions

Volume 15, Issue 2

139 -- 140Kevin Ryan. Introduction to the RE 09 special issue
141 -- 175Daniel Laurence Moody, Patrick Heymans, Raimundas Matulevicius. Visual syntax does matter: improving the cognitive effectiveness of the ::::i::::* visual notation
177 -- 196Jon Whittle, Peter Sawyer, Nelly Bencomo, Betty H. C. Cheng, Jean-Michel Bruel. RELAX: a language to address uncertainty in self-adaptive systems requirement
197 -- 214Gunter Mussbacher, Jon Whittle, Daniel Amyot. Modeling and detecting semantic-based interactions in aspect-oriented scenarios
215 -- 233Remo Ferrari, James A. Miller, Nazim H. Madhavji. A controlled experiment to assess the impact of system architectures on new system requirements
235 -- 265Shahram Esmaeilsabzali, Nancy A. Day, Joanne M. Atlee, Jianwei Niu. Deconstructing the semantics of big-step modelling languages

Volume 15, Issue 1

1 -- 5Eric Dubois, Haralambos Mouratidis. Guest editorial: security requirements engineering: past, present and future
7 -- 40Benjamin Fabian, Seda F. Gürses, Maritta Heisel, Thomas Santen, Holger Schmidt. A comparison of security requirements engineering methods
41 -- 62Golnaz Elahi, Eric S. K. Yu, Nicola Zannone. A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities
63 -- 93Siv Hilde Houmb, Shareeful Islam, Eric Knauss, Jan Jürjens, Kurt Schneider. Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec
95 -- 118Igor Siveroni, Andrea Zisman, George Spanoudakis. A UML-based static verification framework for security
119 -- 137Aaron K. Massey, Paul N. Otto, Lauren J. Hayward, Annie I. Antón. Evaluating existing security and privacy requirements for legal compliance