9. ISO/IEC, ISO/IEC 13335 Information technology - Security techniques - Management of
information and comunications technology security - Part 1: Concepts and models for in-
formation and comunications technology security management. 2004.
10. ISO/IEC, ISO/IEC 15408:2005 Information technology - Security techniques - Evaluation
criteria for IT security, (Common Criteria v3.0). 2005.
11. ISO/IEC, ISO/IEC 17799 Information technology - Security techniques - Code of practice
for information security management. 2005.
12. ISO/IEC, ISO/IEC 27001:2005 Information technology -- Security techniques -- Informa-
tion security management systems -- Requirements. 2005.
13. Jürjens, J., UMLsec: extending UML for secure systems development. UML 2002 - The
Unified Modeling Language. Model Engineering, Languages,Concepts, and Tools. 5th In-
ternational Conference., 2002. LNCS 2460: p. 412-425.
14. Käkölä, T. and Dueñas, J.C., Software Product Lines: Research Issues in Engineering and
Management. 2006: Springer.
15. Kang, K., Cohen, S., Hess, J.A., Novak, W.E., and Peterson, S.A., Feature-Oriented Do-
main Analysis (FODA) Feasibility Study. 1990, Software Engineering Institute, Carnegie-
Mellon University.
16. Kim, J., Kim, M., and Park, S., Goal and scenario bases domain requirements analysis
environment. The Journal of Systems and Software, 79(7) (2005). p. 926 - 938.
17. Kim., H.-K., Automatic Translation Form Requirements Model into Use Cases Modeling
on UML. ICCSA 2005, LNCS, 2005: p. 769-777.
18. Kotonya, G. and Sommerville, I., Requirements Engineering Process and Techniques.
Hardcover ed. 1998, UK: John Willey & Sons. 294.
19. Kotonya, G. and Sommerville, I., Requirements Engineering Process and Techniques.
2000: John Willey & Sons.
20. Lee, J., Lee, J., Lee, S., and Choi, B., A CC-based Security Engineering Process Evalua-
tion Model. 27th Annual International Computer Software and Applications Conference
(COMPSAC'03), 2003: p. 130-.
21. López, F., Amutio, M.A., Candau, J., and Mañas, J.A., Methodology for Information Sys-
tems Risk Analysis and Management. 2005: Ministry of Public Administration.
22. McDermott, J. and Fox, C. Using Abuse Case Models for Security Requirements Analysis.
in Annual Computer Security Applications Conference. 1999. Phoenix, Arizona.
23. Mead, N.R. and Stehney, T. Security Quality Requirements Engineering (SQUARE) Meth-
odology. in Software Engineering for Secure Systems (SESS05), ICSE 2005 International
Workshop on Requirements for High Assurance Systems. 2005. St. Louis.
24. Mellado, D., Fernández-Medina, E., and Piattini, M., A Comparative Study of Proposals for
Establishing Security Requirements for the Development of Secure Information Systems.
The 2006 International Conference on Computational Science and its Applications (ICCSA
2006), Springer LNCS 3982, 2006. 3: p. 1044-1053.
25. Mellado, D., Fernández-Medina, E., and Piattini, M., A Common Criteria Based Security
Requirements Engineering Process for the Development of Secure Information Systems.
Computer Standards and Interfaces, 29(2) (2007). p. 244 - 253.
26. Mellado, D., Rodríguez, M., Fernández-Medina, E., and Piattini, M., Soporte Automatizado
a la Ingeniería de Requisitos de Seguridad. X Workshop Iberoamericano de Ingeniería de
Requisitos y Ambientes de Software (IDEAS'07), 2007: p. (accepted).
27. Pohl, K., Böckle, G., and Linden, F.v.d., Software Product Line Engineering. Foundations,
Principles and Techniques. 2005, Berlin Heidelberg: Springer.
28. Popp, G., Jürjens, J., Wimmel, G., and Breu, R., Security-Critical System Development
with Extended Use Cases. 2003: 10th Asia-Pacific Software Engineering Conference. p.
478-487.
29. Schmid, K., Krennrich, K., and Eisenbarth, M., Requirements Management for Product
Lines: A Prototype. 2005, Fraunhofer IESE.
231