Adapting the SQUARE Process for Privacy Requirements Engineering
暂无分享,去创建一个
[1] Joachim Karlsson,et al. A Cost-Value Approach for Prioritizing Requirements , 1997, IEEE Softw..
[2] Michael Weiss,et al. Security Patterns Meet Agent Oriented Software Engineering: A Complementary Solution for Developing Secure Information Systems , 2005, ER.
[3] Nancy R. Mead,et al. Privacy Risk Assessment in Privacy Requirements Engineering , 2009, 2009 Second International Workshop on Requirements Engineering and Law.
[4] Kyo Chul Kang,et al. Feature-Oriented Domain Analysis (FODA) Feasibility Study , 1990 .
[5] Annie I. Antón,et al. A Taxonomy for Web Site Privacy Requirements , 2001 .
[6] M. Pursley. Report Documentation Page Form Approved Omb No. 0704-0188 Please Do Not Return Your Form to the above Address. 1. Report Date (dd-mm-yyyy) Final Technical Report Receiver Statistics for Cognitive Radios in Dynamic Spectrum Access Networks Onr , 2007 .
[7] Daniel J. Solove. A Taxonomy of Privacy , 2006 .
[8] Seiya Miyazaki,et al. Computer-Aided Privacy Requirements Elicitation Technique , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.
[9] Lorrie Faith Cranor,et al. I Didn't buy It for Myself , 2004, Designing Personalized User Experiences in eCommerce.
[10] J. Borges,et al. A TAXONOMY OF PRIVACY , 2006 .
[11] Marco Casassa Mont,et al. Privacy policy enforcement in enterprises with identity management solutions , 2008 .
[12] Peter R. Jones,et al. Implementation and Evaluation , 1995 .
[13] Joseph W. Yoder,et al. Architectural Patterns for Enabling Application Security , 1998 .
[14] Jane Wood,et al. Joint Application Design: How to Design Quality Systems in 40% Less Time , 1989 .
[15] G. Duncan,et al. Private Lives and Public Policies: Confidentiality and Accessibility of Government Statistics , 1993 .
[16] Aldo Dagnino,et al. Deriving Goals from a Use-Case Based Requirements Specification , 2001, Requirements Engineering.
[17] Eduardo B. Fernandez,et al. A pattern language for security models , 2001 .
[18] Annie I. Antón,et al. Prioritizing Legal Requirements , 2009, 2009 Second International Workshop on Requirements Engineering and Law.
[19] John C. Kelly,et al. An analysis of defect densities found during software inspections , 1992, J. Syst. Softw..
[20] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[21] Ivar Jacobson,et al. Object-oriented software engineering - a use case driven approach , 1993, TOOLS.
[22] D. Pinto. Secrets and Lies: Digital Security in a Networked World , 2003 .
[23] Paul D Nielsen,et al. Software Engineering Institute: Year in Review 2008 , 2008 .
[24] Richard Pierce Hubbard,et al. Design, implementation and evaluation of a process to structure the collection of software project requirements , 1999 .
[25] Betty H. C. Cheng,et al. Using Security Patterns to Model and Analyze Security Requirements , 2012 .
[26] B. Boehm. Software risk management: principles and practices , 1991, IEEE Software.
[27] Nancy R. Mead,et al. Security quality requirements engineering (SQUARE) methodology , 2005, SESS@ICSE.
[28] Markus Schumacher,et al. Security Engineering with Patterns: Origins, Theoretical Models, and New Applications , 2003 .
[29] T. Saaty,et al. The Analytic Hierarchy Process , 1985 .
[30] Chen Wang,et al. Taxonomy of security considerations and software quality , 2003, CACM.
[31] Adam A. Porter,et al. Comparing Detection Methods for Software Requirements Inspections: A Replicated Experiment , 1995, IEEE Trans. Software Eng..
[32] Lorrie Faith Cranor,et al. 'I didn't buy it for myself' privacy and ecommerce personalization , 2003, WPES '03.
[33] Joachim Karlsson,et al. Software requirements prioritizing , 1996, Proceedings of the Second International Conference on Requirements Engineering.
[34] Varokas Panusuwan,et al. Privacy Risk Assessment Case Studies in Support of SQUARE , 2009 .