, Security quality requirements engineering (SQUARE) methodology, vol.30, 2005.
Elaborating security requirements by construction of intentional anti-models, 26th International Conference on Software Engineering, pp.148-157, 2004. ,
Requirements engineering: from system goals to UML models to software specifications, 2009. ,
A pattern system for security requirements engineering', in Availability, Reliability and Security, The Second International Conference on, pp.356-365, 2007. ,
From socio-technical requirements to technical security design: an sts-based framework, 2015. ,
Towards the weaving of the characteristics of good security requirements, International Conference on Risks and Security of Internet and Systems -CRISIS 2016, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01690137
Model-based management of information system security risk, 2009. ,
URL : https://hal.archives-ouvertes.fr/tel-00402996
A comparison of security requirements engineering methods, Requir. Eng, vol.15, issue.1, pp.7-40, 2010. ,
Comparing privacy requirements engineering approaches, 2012 Seventh International Conference on, pp.574-581, 2012. ,
A review of security requirements engineering methods with respect to risk analysis and modeldriven engineering, International Conference on Availability, Reliability, and Security, pp.79-93, 2014. ,
Reusable knowledge in security requirements engineering: a systematic mapping study, Requir. Eng, pp.1-33, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01133226
Engineering Security into Distributed Systems: A Survey of Methodologies, J UCS, vol.18, issue.20, pp.2920-3006, 2012. ,
A framework for requirements engineering method selection, Int. J. Ind. Syst. Eng, vol.8, issue.2, pp.198-214, 2011. ,
, IEEE Guide for Developing System Requirements Specifications, IEEE Std, vol.1233, 1998.
Security requirements engineering for evolving software systems: A survey, 2009. ,
How to compare the Security Quality Requirements Engineering (SQUARE) method with other methods', DTIC Document, 2007. ,
ISO/IEC/IEEE 29148:2011 Systems and software engineering -Life cycle processes -Requirements engineering, Int. Organ. Stand, 2011. ,
Enterprise security architecture: a business-driven approach, 2005. ,
, NIST Computer Security Publications -NIST Special Publications (SPs), vol.17, 2016.
Prioritizing Requirements, J. Object Technol, vol.3, issue.8, pp.35-48, 2004. ,
ISO/IEC 31010:2009 -Risk management -Risk assessment techniques, Int. Organ. Stand, 2009. ,