The Community for Technology Leaders
2014 IEEE 4th International Workshop on Requirements Patterns (RePa) (2014)
Karlskrona, Sweden
Aug. 26, 2014 to Aug. 26, 2014
ISBN: 978-1-4799-6328-7
TABLE OF CONTENTS

Title page (PDF)

pp. i-ii

Contents (PDF)

pp. 1

Requirement boilerplates: Transition from manually-enforced to automatically-verifiable natural language patterns (Abstract)

Chetan Arora , SnT Centre for Security, Reliability and Trust University of Luxembourg, Luxembourg
Mehrdad Sabetzadeh , SnT Centre for Security, Reliability and Trust University of Luxembourg, Luxembourg
Lionel C. Briand , SnT Centre for Security, Reliability and Trust University of Luxembourg, Luxembourg
Frank Zimmer , SES TechCom 9, rue Pierre Werner, Betzdorf, Luxembourg
pp. 1-8

Semantic annotation of a formal grammar by SemanticPatterns (Abstract)

Mathias Schraps , Software Development Audi Electronics Venture GmbH Gaimersheim, Germany
Maximilian Peters , Software Engineering Group Leibniz Universität Hannover Hannover, Germany
pp. 9-16

A feature modeling approach for domain-specific requirement elicitation (Abstract)

Olga De Troyer , Dept. Computer Science Vrije Universiteit Brussel Brussels - Belgium
Erik Janssens , Dept. Computer Science Vrije Universiteit Brussel Brussels - Belgium
pp. 17-24

Reusing non-functional patterns in i∗ modeling (Abstract)

Herbet Cunha , Departamento de Informática Pontificia Universidade Católica do Rio de Janeiro Rio de Janeiro, Brasil
Julio Cesar Sampaio do Prado Leite , Departamento de Informática Pontificia Universidade Católica do Rio de Janeiro Rio de Janeiro, Brasil
pp. 25-32

Requirements engineering patterns for the modeling of Online Social Networks features (Abstract)

Sarah Bouraga , Dept. of Business Administration, PReCISE, University of Namur, Namur, Belgium
Ivan Jureta , Dept. of Business Administration, PReCISE, University of Namur, FNRS, Brussels Namur, Belgium
Stephane Faulkner , Dept. of Business Administration, PReCISE, University of Namur, Namur, Belgium
pp. 33-38

Privacy requirements patterns for mobile operating systems (Abstract)

Xiao Xuan , College of Computer Science and Technology, Zhejiang University, China
Ye Wang , School of Computer Science and Information Engineering, Zhejiang Gongshang University, China
Shanping Li , College of Computer Science and Technology, Zhejiang University, China
pp. 39-42

Threat and countermeasure patterns for cloud computing (Abstract)

Takao Okubo , Graduate School of Information Security Institute of Information Security Yokohama, Japan
Yoshiro Wataguchi , Secure Computing Laboratory Fujitsu Laboratoriues limited Kawasaki, Japan
Nobuyuki Kanaya , Secure Computing Laboratory Fujitsu Laboratoriues limited Kawasaki, Japan
pp. 43-46

Using non-functional requirements templates for elicitation: A case study (Abstract)

Sylwia Kopczynska , Institute of Computing Science Poznan University of Technology ul. Piotrowo 2, 60-965 Poznan, Poland
Jerzy Nawrocki , Institute of Computing Science Poznan University of Technology ul. Piotrowo 2, 60-965 Poznan, Poland
pp. 47-54
81 ms
(Ver 3.3 (11022016))