82 papers:
- DAC-2015-ShererRO #functional #safety
- Ensuring functional safety compliance for ISO 26262 (ADS, JR, RO), p. 3.
- ICGT-2015-KwantesGKR #modelling #process #towards #verification
- Towards Compliance Verification Between Global and Local Process Models (PMK, PVG, JK, AR), pp. 221–236.
- CHI-2015-KonradBCTNDPW #adaptation #automation #reduction
- Finding the Adaptive Sweet Spot: Balancing Compliance and Achievement in Automated Stress Reduction (AK, VB, NC, ST, LN, HD, PP, SW), pp. 3829–3838.
- MoDELS-2015-SunkleKK #case study #modelling
- Model-driven regulatory compliance: A case study of “Know Your Customer” regulations (SS, DK, VK), pp. 436–445.
- SAC-2015-AwadBESAS #anti #approach #detection #process #runtime
- Runtime detection of business process compliance violations: an approach based on anti patterns (AA, AB, AE, RES, AA, SS), pp. 1203–1210.
- SAC-2015-OjameruayeB #analysis #framework
- A risk — aware framework for compliance goal-obstacle analysis (BO, RB), pp. 1401–1402.
- ESEC-FSE-2015-GhaisasMBGKV #automation #security #towards
- Towards automating the security compliance value chain (SG, MM, BB, AG, RK, HMV), pp. 1014–1017.
- VMCAI-2015-CortesiFPT #mobile #policy #privacy #semantics #verification
- Datacentric Semantics for Verification of Privacy Policy Compliance by Mobile Applications (AC, PF, MP, OT), pp. 61–79.
- ASE-2014-BurgDMDGH #consistency #nondeterminism #process
- Tracing software build processes to uncover license compliance inconsistencies (SvdB, ED, SM, JD, DMG, AH), pp. 731–742.
- ASE-2014-PruijtKWB #architecture #named #set
- HUSACCT: architecture compliance checking with rich sets of module and rule types (LJP, CK, JMvdW, SB), pp. 851–854.
- EDOC-2014-KoetterKWFL #requirements
- Integrating Compliance Requirements across Business and IT (FK, MK, AW, CF, FL), pp. 218–225.
- ICEIS-v3-2014-AlvesVS #analysis #architecture
- Architecture Principles Compliance Analysis (JA, AV, PS), pp. 328–334.
- RE-2014-Buksa #process
- Business processes and regulations compliance management technology (IB), pp. 489–493.
- RE-2014-GhanavatiRDA #multi
- Goal-oriented compliance with multiple regulations (SG, AR, ED, DA), pp. 73–82.
- RE-2014-IngolfoSM #reasoning #requirements
- Nòmos 3: Reasoning about regulatory compliance of requirements (SI, AS, JM), pp. 313–314.
- REFSQ-2014-OjameruayeB #requirements #using
- Systematic Elaboration of Compliance Requirements Using Compliance Debt and Portfolio Theory (BO, RB), pp. 152–167.
- FSE-2014-Brunink #monitoring #non-functional
- Autonomous compliance monitoring of non-functional properties (MB), pp. 795–798.
- ICPC-2013-PruijtKB #analysis #architecture #dependence #on the
- On the accuracy of Architecture Compliance Checking support Accuracy of dependency analysis and violation reporting (LP, CK, SB), pp. 172–181.
- ICSM-2013-PruijtKB #architecture #case study #comparative #composition #semantics #tool support
- Architecture Compliance Checking of Semantically Rich Modular Architectures: A Comparative Study of Tool Support (LP, CK, SB), pp. 220–229.
- DUXU-NTE-2013-DuarteRTVTN #behaviour
- Sense of Presence in a VR-Based Study on Behavioral Compliance with Warnings (ED, FR, LT, EV, JT, PN), pp. 362–371.
- HIMI-D-2013-PietrasSHKSJLJ #usability
- Usability Compliance Audit for Technology Intelligence Services (NP, MS, MH, JK, SKS, DHJ, SL, HJ), pp. 524–533.
- CAiSE-2013-TaghiabadiFDA #requirements
- Diagnostic Information for Compliance Checking of Temporal Compliance Requirements (ERT, DF, BFvD, WMPvdA), pp. 304–320.
- EDOC-2013-LyMMRA #comparison #evaluation #framework #monitoring
- A Framework for the Systematic Comparison and Evaluation of Compliance Monitoring Approaches (LTL, FMM, MM, SRM, WMPvdA), pp. 7–16.
- REFSQ-2013-IngolfoSJSPM
- Choosing Compliance Solutions through Stakeholder Preferences (SI, AS, IJ, AS, AP, JM), pp. 206–220.
- SAC-2013-TranLZ #architecture #metadata #security
- Derivation of domain-specific architectural knowledge views from governance and security compliance metadata (HT, IL, UZ), pp. 1728–1733.
- ICST-2013-CompagnaGB #as a service #process #security #validation
- Business Process Compliance via Security Validation as a Service (LC, PG, ADB), pp. 455–462.
- IFM-2012-SchunselaarMS #declarative #modelling
- Patterns for a Log-Based Strengthening of Declarative Compliance Models (DMMS, FMM, NS), pp. 327–342.
- CHI-2012-MasliT #community #online
- Evaluating compliance-without-pressure techniques for increasing participation in online communities (MM, LGT), pp. 2915–2924.
- CHI-2012-TolmieBFBATFG #case study #experience #quote
- “Act natural”: instructions, compliance and accountability in ambulatory experiences (PT, SB, MF, PB, MA, NT, JRF, GG), pp. 1519–1528.
- CAiSE-2012-AbdullahSI #comprehension #modelling #ontology
- A Compliance Management Ontology: Developing Shared Understanding through Models (NSA, SWS, MI), pp. 429–444.
- CAiSE-2012-BinderDDDFGGHHRRW #case study #clustering #experience #on the #process
- On Analyzing Process Compliance in Skin Cancer Treatment: An Experience Report from the Evidence-Based Medical Compliance Cluster (EBMC2) (MB, WD, GD, RD, KAF, WG, WG, KH, MH, SRM, CR, SW), pp. 398–413.
- CAiSE-2012-KaragiannisMM #approach #evaluation #heatmap #metamodelling
- Compliance Evaluation Featuring Heat Maps (CE-HM): A Meta-Modeling-Based Approach (DK, CM, AM), pp. 414–428.
- KDD-2012-Williams
- Ensembles and model delivery for tax compliance (GW), p. 1003.
- RE-2012-MaxwellAS #evolution #predict #requirements
- Managing changing compliance requirements by predicting regulatory evolution (JCM, AIA, PPS), pp. 101–110.
- RE-2012-TawhidBCAMSABR #security #towards
- Towards outcome-based regulatory compliance in aviation security (RT, EB, NC, MA, GM, AS, DA, SAB, GR), pp. 267–272.
- REFSQ-2012-NekviMFB
- Impediments to Requirements-Compliance (MRIN, NHM, RF, BB), pp. 30–36.
- CAiSE-2011-AwadGTW #approach #process #synthesis
- An Iterative Approach for Business Process Template Synthesis from Compliance Rules (AA, RG, JT, MW), pp. 406–421.
- CAiSE-2011-VicenteS #concept
- A Conceptual Model for Integrated Governance, Risk and Compliance (PV, MMdS), pp. 199–213.
- EDOC-2011-KharbiliMKP #modelling #named
- CoReL: Policy-Based and Model-Driven Regulatory Compliance Management (MEK, QM, PK, EP), pp. 247–256.
- EDOC-2011-SchleicherFGLNSS #strict
- Compliance Domains: A Means to Model Data-Restrictions in Cloud Environments (DS, CF, SG, FL, AN, PS, DS), pp. 257–266.
- CASE-2010-LiYG #learning
- Learning compliance control of robot manipulators in contact with the unknown environment (YL, CY, SSG), pp. 644–649.
- ICSM-2010-ZhangSZ #automation
- Automatic checking of license compliance (HZ, BS, LZ), pp. 1–3.
- CHI-2010-CramerESGW #mobile #social #trust
- Trying too hard: effects of mobile agents’ (Inappropriate) social expressiveness on trust, affect and compliance (HSMC, VE, TvS, MG, BJW), pp. 1471–1474.
- CAiSE-2010-AbdullahSI #challenge #information management #research
- Emerging Challenges in Information Systems Research for Regulatory Compliance Management (NSA, SWS, MI), pp. 251–265.
- CAiSE-2010-LyRD #design #graph #information management #verification
- Design and Verification of Instantiable Compliance Rule Graphs in Process-Aware Information Systems (LTL, SRM, PD), pp. 9–23.
- CAiSE-2010-WeidlichPDM #behaviour #metric #process
- Process Compliance Measurement Based on Behavioural Profiles (MW, AP, ND, JM), pp. 499–514.
- SAC-2010-AraujoSCA #process #validation
- A method for validating the compliance of business processes to business rules (BdMA, EAS, ALC, AJA), pp. 145–149.
- SAC-2010-Herold #architecture #component
- Checking architectural compliance in component-based systems (SH), pp. 2244–2251.
- CSMR-2009-Chikofsky #architecture #process #using
- Using the ACART Process for Architecture Compliance (EJC), pp. 313–314.
- EDOC-2009-DeitersDHR #architecture #enterprise #rule-based
- Rule-Based Architectural Compliance Checks for Enterprise Architecture Management (CD, PD, SH, AR), pp. 183–192.
- CIKM-2009-SayeedSDHMR #analysis #documentation #metric #similarity
- Characteristics of document similarity measures for compliance analysis (ABS, SS, YD, RH, RM, NR), pp. 1207–1216.
- RE-2009-GhanavatiAP #analysis #evaluation
- Compliance Analysis Based on a Goal-oriented Requirement Language Evaluation Methodology (SG, DA, LP), pp. 133–142.
- DATE-2008-FreuerJGN #constraints #design #higher-order #on the #verification
- On the Verification of High-Order Constraint Compliance in IC Design (JBF, GJ, JG, WN), pp. 26–31.
- CSMR-2008-KnodelMHM #architecture #case study #experience #industrial
- Architecture Compliance Checking — Experiences from Successful Technology Transfer to Industry (JK, DM, UH, GM), pp. 43–52.
- ICSM-2008-KnodelMR #architecture #empirical #feedback
- Constructive architecture compliance checking — an experiment on support by live feedback (JK, DM, DR), pp. 287–296.
- EDOC-2008-Fabry #database #requirements
- Database Vault: Enforcing Separation of Duties to Meet Regulatory Compliance Requirements (HWF).
- RE-2008-BreauxABD #case study #industrial #requirements
- Legal Requirements, Compliance and Practice: An Industry Case Study in Accessibility (TDB, AIA, KB, MD), pp. 43–52.
- RE-2008-RifautD #assessment #framework #quality #requirements #using
- Using Goal-Oriented Requirements Engineering for Improving the Quality of ISO/IEC 15504 based Compliance Assessment Frameworks (AR, ED), pp. 33–42.
- ICSE-2008-BunyakiatiFSC #standard #testing #uml #using
- Using JULE to generate a compliance test suite for the UML standard (PB, AF, JS, CC), pp. 827–830.
- ICSE-2008-HohnJ #automation #modelling #named
- Rubacon: automated support for model-based compliance engineering (SH, JJ), pp. 875–878.
- WICSA-2007-ClercLV #architecture #development #multi
- Assessing a Multi-Site Development Organization for Architectural Compliance (VC, PL, HvV), p. 10.
- WICSA-2007-KnodelP #architecture #comparison
- A Comparison of Static Architecture Compliance Checking Approaches (JK, DP), p. 12.
- DAC-2007-AdirAFJP #architecture #framework #validation
- A Framework for the Validation of Processor Architecture Compliance (AA, SA, LF, IJ, OP), pp. 902–905.
- DATE-2007-MarianiBC #design #using
- Using an innovative SoC-level FMEA methodology to design in compliance with IEC61508 (RM, GB, FC), pp. 492–497.
- CAiSE-2007-GhanavatiAP #framework #towards
- Towards a Framework for Tracking Legal Compliance in Healthcare (SG, DA, LP), pp. 218–232.
- EDOC-2007-YipPR #ontology
- Rules and Ontology in Compliance Management (FY, NP, PR), pp. 435–442.
- RE-2007-KaragiannisMS
- Business Process-Based Regulation Compliance: The Case of the Sarbanes-Oxley Act (DK, JM, MS), pp. 315–321.
- EDOC-2006-GovernatoriMS #contract #process
- Compliance checking between business processes and business contracts (GG, ZM, SWS), pp. 221–232.
- ICEIS-DISI-2006-MoallaBNOT #industrial #information management
- Data Compliance in Pharmaceutical Industry — Interoperability to Align Business and Information Systems (NM, AB, GN, YO, NT), pp. 79–86.
- ICEIS-J-2006-MoallaBNO #industrial #information management #towards
- Toward Data Compliance in Vaccine Industry: Interoperability to Align Business and Information Systems (NM, AB, GN, YO), pp. 98–111.
- RE-2006-BreauxVA #requirements #towards
- Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations (TDB, MWV, AIA), pp. 46–55.
- ICLP-2006-SzaboS #prolog #standard
- Improving the ISO Prolog Standard by Analyzing Compliance Test Results (PS, PS), pp. 257–269.
- VLDB-2004-AgrawalBFKRS #database
- Auditing Compliance with a Hippocratic Database (RA, RJBJ, CF, JK, RR, RS), pp. 516–527.
- ICEIS-2002-CheungCD #design #process #standard
- Supporting Engineering Design Process with an Intelligent Compliance Agent: A Way to Ensure a Standard Complied Process (LYCC, PWHC, RD), pp. 341–349.
- ICSE-2002-AtiyaK #concurrent #verification
- A compliance notation for verifying concurrent systems (DMA, SK), pp. 731–732.
- TestCom-2002-Kone #protocol
- Compliance of Wireless Application Protocols (OK), pp. 129–138.
- ICSM-1999-InteresseD #case study #experience #verification
- Experience Paper: Beyond Year 2000 Remediation: The Compliance Verification: A Case Study (MI, RD), pp. 155–160.
- ICSM-1999-KloschE #case study #challenge #evolution #experience
- Experience Paper: Challenges and Experiences in Managing Major Software Evolution Endeavours Such as Euro Conversion or Y2000 Compliance (RK, WE), pp. 161–166.
- ICSM-1997-Reed
- DLA’S YEAR 2000 REMEDIATION PROGRAM: Managing Organization-Wide Conversion and Compliance (SJR), pp. 198–205.
- OOPSLA-1996-Yelland #case study #design pattern #framework
- Creating Host Compliance in a Portable Framework: A Study in the Use of Existing Design Patterns (PMY), pp. 18–29.
- ICSE-1996-SefikaSC #design #modelling #monitoring
- Monitoring Compliance of a Software System with Its High-Level Design Models (MS, AS, RHC), pp. 387–396.
- DAC-1977-GodoyFB #automation #design #logic #testing
- Automatic checking of logic design structures For compliance with testability ground rules (HCG, GBF, PSB), pp. 469–478.