Abstract is missing.
- Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoringTom-Michael Hesse, Stefan Gärtner, Tobias Roehm, Barbara Paech, Kurt Schneider, Bernd Bruegge. 1-6 [doi]
- Argumentation-based security requirements elicitation: The next roundDan Ionita, Jan-Willem Bullee, Roel Wieringa. 7-12 [doi]
- Towards a framework to measure security expertise in requirements analysisHanan Hibshi, Travis D. Breaux, Maria Riaz, Laurie A. Williams. 13-18 [doi]
- Engineering privacy requirements valuable lessons from another realmYod-Samuel Martín, José M. del Álamo, Juan C. Yelmo. 19-24 [doi]
- L-SQUARE: Preliminary extension of the SQUARE methodology to address legal complianceAaron Alva, Lisa Young. 25-30 [doi]
- Supporting evolving security models for an agile security evaluationWolfgang Raschke, Massimiliano Zilli, Philip Baumgartner, Johannes Loinig, Christian Steger, Christian Kreiner. 31-36 [doi]
- Using malware analysis to improve security requirements on future systemsNaney R. Mead, Jose Andre Morales. 37-41 [doi]
- Pattern-based and ISO 27001 compliant risk analysis for cloud systemsAzadeh Alebrahim, Denis Hatebur, Ludger Goeke. 42-47 [doi]