10. Jürjens, J. UMLsec: extending UML for secure systems development. Proceedings of the
5th International Conference on the Unified Modeling Language. LNCS, vol. 2460.
Springer, (2002) 412-425
11. Yu, E., Liu, L., Mylopoulos, J.: A social ontology for integrating security and software
engineering. In Mouratidis H. and Giorgini P. ed., Integrating Security and Software En-
gineering: Advances and Future Visions. Idea Group Publishing, (2006) 70-105
12. Dubois E., Mayer N., Rifaut A.: Improving risk-based security analysis with i*. In Yu E.
et al ed, Social Modeling for Requirements Engineering. The MIT Press, (2011) 281-311
13. Giorgini P., Mouratidis H., Zannone N.: Modelling security and trust with secure Tropos,
In Mouratidis H. and Giorgini P. ed., Integrating Security and Software Engineering: Ad-
vances and Future Visions. Idea Group Publishing, (2006) 70-105
14. Mouratidis H., Giorgini P.: Secure Tropos: extending i* and Tropos to model security
throughout the development process. In Yu E. et al ed, Social Modeling for Requirements
Engineering. The MIT Press, (2011) 363-402
15. Lin, L., Nuseibeh, B., Ince, D., Jackson, M.: Using abuse frames to bound the scope of
security problems. Proceedings of the 12th IEEE International Conference on Require-
ments Engineering. IEEE CS, (2004) 354-355
16. Cheng, B.H.C., Konrad, S., Campbell, L.A., Wassermann, R.: Using security patterns to
model and analyze security. In IEEE Workshop on Requirements for High Assurance Sys-
tems. (2003) 13-22
17. Herzog, A., Shahmehri, N., Duma, C.: An ontology of information security. International
Journal of Information Security and Privacy. 1, 4, (2007) 1-23
18. Lasheras, J., Valencia-Garcia, R., Fernandez-Breis, J.T., Toval, A.: Modelling reusable
security requirements based on an ontology framework. Journal of Research and Practice
in Information Technology. 41, 2, (2009) 119-133
19. Dardenne A., van Lamsweerde A., Fickas S.: Goal-directed requirements acquisition.
Science of Computer Programming. 20,1-2, (1993) 3-50
20. Yu, E.S.K.: Towards modelling and reasoning support for early-phase requirements engi-
neering. Proceedings of the 3rd International Symposium on Requirements Engineering,
IEEE, (1997) 226-235
21. Giunchiglia, F., Mylopoulos, J., Perini, A.: The Tropos software development methodolo-
gy: Processes, models and diagrams. Proceedings of the 1st International Joint Conference
on: Autonomous Agents and Multi-agent Systems. ACM, (2002) 35-36.
22. Jacobson I., Christerson M., Jonsson P., Overgaard G.: Object-Oriented Software Engi-
neering - A Use Case Driven Approach, Addison-Wesley, (1992)
23. Jackson M.: Problem Frames: Analysing and Structuring Software Development Problems
Addison-Wesley (2001)
24. Blanco, C. et al.: Basis for an integrated security ontology according to a systematic re-
view of existing proposals. Computer Standards and Interfaces, online first publication,
(2011) doi:10.1016/j.csi.2010.12.002
25. Thomas R.G.: A translation approach to portable ontology specifications. Knowledge
Acquisition. 5, 2, (1993) 199-220
26. Alexander, I.: Misuse cases help to elicit non-functional requirements. Computing and
Control Engineering Journal. 14, 1, (2003) 40-45
27. Sindre, G., Opdahl, A.L. Templates for misuse case description. Proc. of the 7th Interna-
tional Workshop on Requirements Engineering, Foundation for Software Quality
(REFSQ’ 01). (2001) 4-5
28. Alexander, I.: Initial industrial experience of misuse cases in trade-off analysis. Proceed-
ings of IEEE Joint International Conference on Requirements Engineering (RE’02). IEEE
CS, (2002) 61-68
29. Hartong, M., Goel, R., Wijesekera, D.: Meta-models for misuse cases. Proceedings of the
5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber
Security and Information Intelligence Challenges and Strategies. ACM, (2009) 33:1-4
111