Abstract
The authors review how to define a set of "negative requirements," or hazards, starting with elicitation and discovery of shall-not requirements through system integration and testing using a process called hazard mining.
Original language | English (US) |
---|---|
Article number | 5196658 |
Pages (from-to) | 46-52 |
Number of pages | 7 |
Journal | IT Professional |
Volume | 12 |
Issue number | 3 |
DOIs | |
State | Published - May 2010 |
All Science Journal Classification (ASJC) codes
- Software
- Hardware and Architecture
- Computer Science Applications