1 | -- | 5 | Eric Dubois, Haralambos Mouratidis. Guest editorial: security requirements engineering: past, present and future |
7 | -- | 40 | Benjamin Fabian, Seda F. Gürses, Maritta Heisel, Thomas Santen, Holger Schmidt. A comparison of security requirements engineering methods |
41 | -- | 62 | Golnaz Elahi, Eric S. K. Yu, Nicola Zannone. A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities |
63 | -- | 93 | Siv Hilde Houmb, Shareeful Islam, Eric Knauss, Jan Jürjens, Kurt Schneider. Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec |
95 | -- | 118 | Igor Siveroni, Andrea Zisman, George Spanoudakis. A UML-based static verification framework for security |
119 | -- | 137 | Aaron K. Massey, Paul N. Otto, Lauren J. Hayward, Annie I. Antón. Evaluating existing security and privacy requirements for legal compliance |