B. Fabian, S. Gürses, M. Heisel, T. Santen, . Et-holger et al., A comparison of security requirements engineering methods, Requirements Engineering, vol.4, issue.2, 2010.
DOI : 10.1007/s00766-009-0092-x

F. Donald, Security Use Cases, Journal of Object Technology, 2003.

M. Glinz, « On Non-Functional Requirements » . RE '07, pp.21-26, 2007.

P. Giorgini, . Mouratidis, and G. Manson, Towards the development of secure information systems: Security Reference Diagram and Security Attack Scenarios, Proceedings of the FORUM at International CAiSE', Riga ? Latvia, 2004.

T. R. Gruber, Toward principles for the design of ontologies used for knowledge sharing?, International Journal of Human-Computer Studies, vol.43, issue.5-6, 1995.
DOI : 10.1006/ijhc.1995.1081

A. Herrmann and A. Morali, RiskREP: Risk-Based Security Requirements Elicitation and Prioritization, 2010.

A. Hevner and S. Chatterjee, Design Research in Information Systems: Theory and Practice. 1 er éd, 2010.
DOI : 10.1007/978-1-4419-5653-8

J. Jan, UMLsec: Extending UML for Secure Systems Development, Proceedings of the 5th International Conference on The Unified Modeling Language, 2002.

M. Kauppinen, S. Kujala, T. Aaltio, and L. Lehtola, Introducing requirements engineering: how to make a cultural change happen in practice, Proceedings IEEE Joint International Conference on Requirements Engineering, 2002.
DOI : 10.1109/ICRE.2002.1048504

. Lamsweerde, Engineering Requirements for System Reliability and Security, pp.196-238, 2007.

T. Lodderstedt, D. Basin, and D. Jürgen, SecureUML: A UML-Based Modeling Language for Model-Driven Security, Proceedings of the 5th International Conference on The Unified Modeling Language, 2002.
DOI : 10.1007/3-540-45800-X_33

N. Mayer, A. Rifaut, and E. Dubois, Towards a Risk-Based Security Requirements Engineering Framework, 2005.

L. Liu, E. Yu, and J. Mylopoulos, Security and privacy requirements analysis within a social setting, Journal of Lightwave Technology, 2003.
DOI : 10.1109/ICRE.2003.1232746

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.79.7282

L. Wei, He Ke-Qing; Wang Jiang; Peng RongHeavywight Semantic Induxement for Requirement Elicitation and analysis, 2007.

J. Mcdermott and C. Fox, Using abuse case models for security requirements analysis, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99), pp.55-66, 1999.
DOI : 10.1109/CSAC.1999.816013

H. Mouratidis, Analysing Security Requirements of information systems using Tropos', on Enterprise Information Systems, 2006.

S. Motoshi and K. Haruhiko, Using Domain Ontology as Domain Knowledge for Requirements Elicitation, 2006.

G. Sindre and A. L. Opdahl, Eliciting security requirements with misuse cases, 2004.

S. Amina, S. Camille, and I. Wattiau, Ontologies for Security requirements : A Literature Survey and Classification, 2012.