Sol J. Greenspan

Learn More
Research issues related to requirements modeling are introduced and discussed through a review of the requirements modeling language RML, its peers and its successors from the time it was first proposed at the Sixth International Conference on Software Engineering (ICSE-6) to the presen~en ICSES later. We note that the central theme of “Capturing More World(More)
When an enterprise considers the acquisition of a COTS (commercial off-the-shelf) system, the procurement process typically includes consideration of technical criteria such as feature sets and ease of integration with other systems. However, any selected COTS system will also have an impact on how the enterprise runs – how the work of the enterprise gets(More)
Business rules represent policies, procedures and constraints regarding how an enterprise conducts its business. To get the full benefits of modeling business rules requires an approach to managing them through their full lifecycle, from acquisition through deployment and evolution. The research reported in this paper is aimed at determining what(More)
The view is adopted that software requirements involve the representation (modeling) of considerable real-world knowledge, not just functional specifications. A framework (RMF) for <underline>requirements models</underline> is presented and its main features are illustrated. RMF allows information about three types of conceptual entities (objects,(More)
This paper discusses a requirements gathering methodology and tool support for a class of systems we term service-oriented systems. The requirements acquisition methodology that our tools support is, not surprisingly, a process centered methodology, since the processes of the system map to the services provided by our organization. The ACME/PRIME tool to(More)
Information system security and privacy, once narrow topics primarily of interest to IS designers, have become critically important to society at large. The scope of associated challenges and applications is broadening accordingly, leading to new requirements and approaches. Information networks are evolving into more open and dynamic systems. Security and(More)