A comparison of security requirements engineering methods, Requirements Engineering, vol.4, issue.2, 2010. ,
DOI : 10.1007/s00766-009-0092-x
Security Use Cases, Journal of Object Technology, 2003. ,
« On Non-Functional Requirements » . RE '07, pp.21-26, 2007. ,
Towards the development of secure information systems: Security Reference Diagram and Security Attack Scenarios, Proceedings of the FORUM at International CAiSE', Riga ? Latvia, 2004. ,
Toward principles for the design of ontologies used for knowledge sharing?, International Journal of Human-Computer Studies, vol.43, issue.5-6, 1995. ,
DOI : 10.1006/ijhc.1995.1081
RiskREP: Risk-Based Security Requirements Elicitation and Prioritization, 2010. ,
Design Research in Information Systems: Theory and Practice. 1 er éd, 2010. ,
DOI : 10.1007/978-1-4419-5653-8
UMLsec: Extending UML for Secure Systems Development, Proceedings of the 5th International Conference on The Unified Modeling Language, 2002. ,
Introducing requirements engineering: how to make a cultural change happen in practice, Proceedings IEEE Joint International Conference on Requirements Engineering, 2002. ,
DOI : 10.1109/ICRE.2002.1048504
Engineering Requirements for System Reliability and Security, pp.196-238, 2007. ,
SecureUML: A UML-Based Modeling Language for Model-Driven Security, Proceedings of the 5th International Conference on The Unified Modeling Language, 2002. ,
DOI : 10.1007/3-540-45800-X_33
Towards a Risk-Based Security Requirements Engineering Framework, 2005. ,
Security and privacy requirements analysis within a social setting, Journal of Lightwave Technology, 2003. ,
DOI : 10.1109/ICRE.2003.1232746
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.79.7282
He Ke-Qing; Wang Jiang; Peng RongHeavywight Semantic Induxement for Requirement Elicitation and analysis, 2007. ,
Using abuse case models for security requirements analysis, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99), pp.55-66, 1999. ,
DOI : 10.1109/CSAC.1999.816013
Analysing Security Requirements of information systems using Tropos', on Enterprise Information Systems, 2006. ,
Using Domain Ontology as Domain Knowledge for Requirements Elicitation, 2006. ,
Eliciting security requirements with misuse cases, 2004. ,
Ontologies for Security requirements : A Literature Survey and Classification, 2012. ,