Adapting the SQUARE Process for Privacy Requirements Engineering

ix

[1]  Joachim Karlsson,et al.  A Cost-Value Approach for Prioritizing Requirements , 1997, IEEE Softw..

[2]  Michael Weiss,et al.  Security Patterns Meet Agent Oriented Software Engineering: A Complementary Solution for Developing Secure Information Systems , 2005, ER.

[3]  Nancy R. Mead,et al.  Privacy Risk Assessment in Privacy Requirements Engineering , 2009, 2009 Second International Workshop on Requirements Engineering and Law.

[4]  Kyo Chul Kang,et al.  Feature-Oriented Domain Analysis (FODA) Feasibility Study , 1990 .

[5]  Annie I. Antón,et al.  A Taxonomy for Web Site Privacy Requirements , 2001 .

[6]  M. Pursley Report Documentation Page Form Approved Omb No. 0704-0188 Please Do Not Return Your Form to the above Address. 1. Report Date (dd-mm-yyyy) Final Technical Report Receiver Statistics for Cognitive Radios in Dynamic Spectrum Access Networks Onr , 2007 .

[7]  Daniel J. Solove A Taxonomy of Privacy , 2006 .

[8]  Seiya Miyazaki,et al.  Computer-Aided Privacy Requirements Elicitation Technique , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[9]  Lorrie Faith Cranor,et al.  I Didn't buy It for Myself , 2004, Designing Personalized User Experiences in eCommerce.

[10]  J. Borges,et al.  A TAXONOMY OF PRIVACY , 2006 .

[11]  Marco Casassa Mont,et al.  Privacy policy enforcement in enterprises with identity management solutions , 2008 .

[12]  Peter R. Jones,et al.  Implementation and Evaluation , 1995 .

[13]  Joseph W. Yoder,et al.  Architectural Patterns for Enabling Application Security , 1998 .

[14]  Jane Wood,et al.  Joint Application Design: How to Design Quality Systems in 40% Less Time , 1989 .

[15]  G. Duncan,et al.  Private Lives and Public Policies: Confidentiality and Accessibility of Government Statistics , 1993 .

[16]  Aldo Dagnino,et al.  Deriving Goals from a Use-Case Based Requirements Specification , 2001, Requirements Engineering.

[17]  Eduardo B. Fernandez,et al.  A pattern language for security models , 2001 .

[18]  Annie I. Antón,et al.  Prioritizing Legal Requirements , 2009, 2009 Second International Workshop on Requirements Engineering and Law.

[19]  John C. Kelly,et al.  An analysis of defect densities found during software inspections , 1992, J. Syst. Softw..

[20]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[21]  Ivar Jacobson,et al.  Object-oriented software engineering - a use case driven approach , 1993, TOOLS.

[22]  D. Pinto Secrets and Lies: Digital Security in a Networked World , 2003 .

[23]  Paul D Nielsen,et al.  Software Engineering Institute: Year in Review 2008 , 2008 .

[24]  Richard Pierce Hubbard,et al.  Design, implementation and evaluation of a process to structure the collection of software project requirements , 1999 .

[25]  Betty H. C. Cheng,et al.  Using Security Patterns to Model and Analyze Security Requirements , 2012 .

[26]  B. Boehm Software risk management: principles and practices , 1991, IEEE Software.

[27]  Nancy R. Mead,et al.  Security quality requirements engineering (SQUARE) methodology , 2005, SESS@ICSE.

[28]  Markus Schumacher,et al.  Security Engineering with Patterns: Origins, Theoretical Models, and New Applications , 2003 .

[29]  T. Saaty,et al.  The Analytic Hierarchy Process , 1985 .

[30]  Chen Wang,et al.  Taxonomy of security considerations and software quality , 2003, CACM.

[31]  Adam A. Porter,et al.  Comparing Detection Methods for Software Requirements Inspections: A Replicated Experiment , 1995, IEEE Trans. Software Eng..

[32]  Lorrie Faith Cranor,et al.  'I didn't buy it for myself' privacy and ecommerce personalization , 2003, WPES '03.

[33]  Joachim Karlsson,et al.  Software requirements prioritizing , 1996, Proceedings of the Second International Conference on Requirements Engineering.

[34]  Varokas Panusuwan,et al.  Privacy Risk Assessment Case Studies in Support of SQUARE , 2009 .