aided privacy threat identification. In APF ’12, pages
1–16. Springer.
Beckers, K., Faßbender, S., Heisel, M., and Paci, F. (2013b).
Combining goal-oriented and problem-oriented re-
quirements engineering methods. In CD-ARES ’13,
pages 278–294.
Beckers, K., Hatebur, D., and Heisel, M. (2013c). A
problem-based threat analysis in compliance with
common criteria. In ARES ’13. IEEE Computer So-
ciety.
Boehm, B. W. and Papaccio, P. N. (1988). Understanding
and controlling software costs. IEEE Transactions on
Software Engineering, 14(10):1462–1477.
Cavusoglu, H., Mishra, B., and Raghunathan, S. (2004).
The effect of internet security breach announce-
ments on market value: Capital market reactions for
breached firms and internet security developers. Int.
J. Electron. Commerce, 9(1):70–104.
Dolev, D. and Yao, A. C. (1983). On the security of pub-
lic key protocols. IEEE Transactions on Information
Theory, 29(2):198–207.
Faßbender, S. and Heisel, M. (2013). From problems
to laws in requirements engineering using model-
transformation. In ICSOFT ’13, pages 447–458.
SciTePress.
Firesmith, D. (2003). Specifying good requirements. Jour-
nal of Object Technology, 2(4).
Haley, C. B., Laney, R., Moffett, J. D., and Nuseibeh, B.
(2008). Security requirements engineering: A frame-
work for representation and analysis. IEEE Transac-
tions on Software Engineering, 34(1):133–153.
Hatebur, D. and Heisel, M. (2010). Making pattern- and
model-based software development more rigorous. In
ICFEM ’10, pages 253–269. Springer.
Howard, M. and Lipner, S. (2006). The Security Devel-
opment Lifecycle : SDL : A Process for Develop-
ing Demonstrably More Secure Software. Microsoft
Press.
ISO/IEC (2009a). Common Criteria for Information Tech-
nology Security Evaluation. ISO/IEC 15408, In-
ternational Organization for Standardization (ISO)
and International Electrotechnical Commission (IEC),
Geneva ,Switzerland.
ISO/IEC (2009b). Information technology - Security tech-
niques - Information security management systems
- Overview and Vocabulary. ISO/IEC 27000, In-
ternational Organization for Standardization (ISO)
and International Electrotechnical Commission (IEC),
Geneva ,Switzerland.
Jackson, M. (2001). Problem Frames. Analyzing and
structuring software development problems. Addison-
Wesley.
J
¨
urjens, J. (2005). Secure Systems Development with UML.
Springer.
Khansa, L., Cook, D. F., James, T., and Bruyaka, O. (2012).
Impact of HIPAA provisions on the stock market value
of healthcare institutions, and information security
and other information technology firms. Computers
& Security, 31(6):750 – 770.
Kreutzmann, H., Vollmer, S., Tekampe, N., and Abromeit,
A. (2011). Protection profile for the gateway of a
smart metering system. Technical report, BSI.
Liu, L., Yu, E., and Mylopoulos, J. (2003). Security and
privacy requirements analysis within a social setting.
In RE ’03, pages 151–161.
McDermott, J. and Fox, C. (1999). Using abuse case mod-
els for security requirements analysis. In ACSAC ’99,
pages 55–64.
Mohammadi, N. G., Alebrahim, A., Weyer, T., Heisel, M.,
and Pohl, K. (2013). A framework for combining
problem frames and goal models to support context
analysis during requirements engineering. In CD-
ARES ’13, pages 272–288.
Mouratidis, H. and Giorgini, P. (2007). Secure Tropos: a
security-oriented extension of the tropos methodol-
ogy. International Journal of Software Engineering
and Knowledge Engineering, 17(2):285–309.
Salehie, M., Pasquale, L., Omoronyia, I., Ali, R., and Nu-
seibeh, B. (2012). Requirements-driven adaptive se-
curity: Protecting variable assets at runtime. In RE
’12, pages 111–120.
Schmidt, H. and J
¨
urjens, J. (2011). Connecting security re-
quirements analysis and secure design using patterns
and UMLsec. In CAiSE ’11, pages 367–382. Springer.
Sindre, G. and Opdahl, A. L. (2005). Eliciting security re-
quirements with misuse cases. Requir. Eng., 10(1):34–
44.
Van Lamsweerde, A. (2004). Elaborating security require-
ments by construction of intentional anti-models. In
ICSE ’04, pages 148–157.
Volkamer, M. and Vogt, R. (2008). Common Criteria Pro-
tection Profile for Basic set of security requirements
for Online Voting Products. Bundesamt f”ur Sicher-
heit in der Informationstechnik.
Willis, R. (1998). Hughes Aircraft’s Widespread Deploy-
ment of a Continuously Improving Software Process.
AD-a358 993. Carnegie-mellon university.
ICSOFT-PT2014-9thInternationalConferenceonSoftwareParadigmTrends
16