153 | -- | 165 | Daniel Mellado, Carlos Blanco, Luís Enrique Sanchez, Eduardo Fernández-Medina. A systematic review of security requirements engineering |
166 | -- | 178 | Miguel A. Martínez, Joaquín Lasheras, Eduardo Fernández-Medina, José Ambrosio Toval Álvarez, Mario Piattini. A Personal Data Audit Method through Requirements Engineering |
179 | -- | 184 | K. C. Morris. A framework for XML schema naming and design rules development tools |
185 | -- | 196 | Félix Gómez Mármol, Gregorio Martínez Pérez. Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems |
197 | -- | 214 | Wesam Darwish, Konstantin Beznosov. Analysis of ANSI RBAC Support in COM+ |
215 | -- | 221 | Hui-Ching Hsieh, Jenq-Shiou Leu, Wei Kuan Shih. A fault-tolerant scheme for an autonomous local wireless sensor network |
222 | -- | 227 | Hamid Mala, Mohsen Shakiba, Mohammad Dakhilalian. New impossible differential attacks on reduced-round Crypton |