Breaux, T. D. and Anton, A. I. 2008, ‘Analyzing regulatory
rules for privacy and security requirements’, IEEE
Trans. on Soft. Eng., vol. 34, No 1, Jan. /Feb., 5-20.
Breaux, T.D. and Gordon, D.G. 2011, ‘Regulatory
requirements as open systems: Structures, patterns and
metrics for the design of formal requirements
specifications’, Rept. CMU-ISR-11-100, Carnegie
Mellon University.
Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P.,
Stal, M. 1996, Pattern-Oriented Software Architecture:
A System of Patterns, Volume 1, Wiley.
Fernandez, E. B., Larrondo-Petrie, M.M., Sorgente, T., and
VanHilst, M. 2006, ‘A methodology to develop secure
systems using patterns", Chapter 5 in "Integrating
security and software engineering: Advances and
future vision’, H. Mouratidis and P. Giorgini (Eds.),
IDEA Press, 107-126.
Fernandez, E. B. and Yuan, X. 2000, ‘Semantic analysis
patterns’, Proceedings of the 19th Int. Conf. on
Conceptual Modeling, ER2000, 183-195.
Fernandez, E. B. 2013, Security patterns in practice:
Building secure architectures using software patterns,
Wiley Series on Software Design Patterns.
Fernandez, E. B. and Mujica, S. 2014, ‘Two patterns for
HIPAA regulations’, Procs. of AsianPLoP (Pattern
Languages of Programs), Tokyo, Japan.
Fernandez, E. B. and Mujica, Sergio 2014, ‘From domain
models to secure and compliant applications’, Procs.
12th LACCEI.
Fernandez, E. B., Monge, Raul, and Hashizume, Keiko
2015, ‘Building a security reference architecture for
cloud systems’, Requirements Engineering. DOI:
10.1007/s00766-014-0218-7.
Fernandez, E. B., Monge, R., Carvajal, Encina, O.,
Hernandez, J., and Silva, P., R. 2014, ‘Patterns for
Content-Dependent and Context-Enhanced
Authorization’. Proceedings of 19th European
Conference on Pattern Languages of Programs,
Germany.
Fowler, M. 1997, Analysis patterns – Reusable object
models, Addison-Wesley.
Gamma, E., Helm, R., Johnson, R., Vlissides, J. 1994,
Design Patterns: Elements of Reusable Object-
Oriented Software, Addison-Wesley, Boston, Mass.
GLBA 2015, Gramm-Leach-Bliley Act. Available from:
<http://www.business.ftc.gov/privacy-and-security/
gramm-leach-bliley-act. [10 January 2015].
Hamdaqa, M. and Hamou-Lhadj, A. 2009, ‘Citation
Analysis: An Approach for Facilitating the Analysis of
Regulatory Compliance Documents’, Procs. 2009 6
th
Int. Conf. on Information technology: New
Generations, IEEE, 278-283.
HIPAA 2015, Understanding Health Information Privacy.
Available from: http://www.hhs.gov/ocr/privacy/
hipaa/understanding/index.html. [8 January 2015].
HIPAA 2013, HIPAA Administrative Simplification.
Available from: <http://www.hhs.gov/ocr/privacy/
hipaa/administrative/combined/hipaa-simplification-
201303.pdf. [10 January 2015].
Lam, Peifung E., Mitchell, John C., Sharada Sundaram
2009, ‘A Formalization of HIPAA for a Medical
Messaging System’, in Trust, Privacy and Security in
Digital Business, Lecture Notes in Computer Science,
Volume 5695, 73-85.
Massacci, F., Presti, M., and Zannone, N. 2005, ‘Using a
security requirements engineering methodology in
practice: the compliance with the Italian data protection
legislation’, Computer Standards & Interfaces, 27 (5),
445-455.
Massey, A.K., Smith, B., Otto, P.N., and Anton, A.I. 2011,
‘Assessing the accuracy of legal implementation
readiness decisions’, 19
th
IEEE Int. Reqs. Eng. Conf.,
207-216.
PCI 2015, Official Source of PCI DSS Data Security
Standards. Available from: <https://www.pcisecurity
standards.org/security_standards/ index.php>. [11
January 2015]
Rumbaugh, J., Jacobson, I., and Booch, G. 1999, The
Unified Modeling Language Reference Manual,
Addison-Wesley, Boston, Mass.
Sorgente, T. and Fernandez 2004, ‘Analysis patterns for
patient treatment’, Procs. of PLoP.
SOX 2015, The Sarbanes-Oxley Act. Available from :<
http://www.soxlaw.com/>. [11 January 2015].
Taylor, R. N., Medvidovic, N., and Dashofy, N. 2010,
Software architecture: Foundation, theory, and
practice, Wiley.
Uzunov, A., Fernandez, E. B., Falkner, K. 2015, ‘ASE: A
Comprehensive Pattern-Driven Security Methodology
for Distributed Systems’, Journal of Computer
Standards & Interfaces , Volume 41, September 2015,
Pages 112-137, http://www.sciencedirect.com/science
/article/pii/S0920548915000276
Warmer, J. and Kleppe, A. 2003, The Object Constraint
Language (2
nd
Ed.), Addison-Wesley.
SECRYPT2015-InternationalConferenceonSecurityandCryptography
440