N. R. Mead and T. Stehney, Security quality requirements engineering (SQUARE) methodology, vol.30, 2005.

A. Van-lamsweerde, Elaborating security requirements by construction of intentional anti-models, 26th International Conference on Software Engineering, pp.148-157, 2004.

A. Van-lamsweerde, Requirements engineering: from system goals to UML models to software specifications, 2009.

D. Hatebur, M. Heisel, and H. Schmidt, A pattern system for security requirements engineering', in Availability, Reliability and Security, The Second International Conference on, pp.356-365, 2007.

M. Salnitri, E. Paja, and P. Giorgini, From socio-technical requirements to technical security design: an sts-based framework, 2015.

S. T. Bulusu, R. Laborde, F. Barrère, A. Benzekri, and A. Samer-wazan, Towards the weaving of the characteristics of good security requirements, International Conference on Risks and Security of Internet and Systems -CRISIS 2016, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01690137

N. Mayer, Model-based management of information system security risk, 2009.
URL : https://hal.archives-ouvertes.fr/tel-00402996

B. Fabian, S. Gürses, M. Heisel, T. Santen, and H. Schmidt, A comparison of security requirements engineering methods, Requir. Eng, vol.15, issue.1, pp.7-40, 2010.

K. Beckers, Comparing privacy requirements engineering approaches, 2012 Seventh International Conference on, pp.574-581, 2012.

D. Muñante, V. Chiprianov, L. Gallon, and P. Aniorté, A review of security requirements engineering methods with respect to risk analysis and modeldriven engineering, International Conference on Availability, Reliability, and Security, pp.79-93, 2014.

A. Souag, R. Mazo, C. Salinesi, and I. Comyn-wattiau, Reusable knowledge in security requirements engineering: a systematic mapping study, Requir. Eng, pp.1-33, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01133226

A. V. Uzunov, E. B. Fernandez, and K. Falkner, Engineering Security into Distributed Systems: A Survey of Methodologies, J UCS, vol.18, issue.20, pp.2920-3006, 2012.

R. Jain, M. Vanleer, and A. Chandrasekaran, A framework for requirements engineering method selection, Int. J. Ind. Syst. Eng, vol.8, issue.2, pp.198-214, 2011.

, IEEE Guide for Developing System Requirements Specifications, IEEE Std, vol.1233, 1998.

A. Nhlabatsi, B. Nuseibeh, and Y. Yu, Security requirements engineering for evolving software systems: A survey, 2009.

N. R. Mead, How to compare the Security Quality Requirements Engineering (SQUARE) method with other methods', DTIC Document, 2007.

I. Iso and I. Ieee, ISO/IEC/IEEE 29148:2011 Systems and software engineering -Life cycle processes -Requirements engineering, Int. Organ. Stand, 2011.

N. A. Sherwood, Enterprise security architecture: a business-driven approach, 2005.

, NIST Computer Security Publications -NIST Special Publications (SPs), vol.17, 2016.

D. Firesmith, Prioritizing Requirements, J. Object Technol, vol.3, issue.8, pp.35-48, 2004.

I. Iso, ISO/IEC 31010:2009 -Risk management -Risk assessment techniques, Int. Organ. Stand, 2009.