M. Hafiz, P. Adamczyk, and R. E. Johnson, Organizing Security Patterns, IEEE Software, vol.24, issue.4, pp.52-60, 2007.
DOI : 10.1109/MS.2007.114

R. Scandariato, K. Yskout, T. Heyman, and W. Joosen, Architecting software with security patterns, 2008.

E. Fernandez-buglioni, Security patterns in practice: designing secure architectures using software patterns, 2013.

H. Mouratidis and P. Giorgini, SECURE TROPOS: A SECURITY-ORIENTED EXTENSION OF THE TROPOS METHODOLOGY, International Journal of Software Engineering and Knowledge Engineering, vol.17, issue.02, pp.285-309, 2007.
DOI : 10.1142/S0218194007003240

L. Liu, E. S. Yu, and J. Mylopoulos, Secure-i*: Engineering secure software systems through social analysis, Int. J. Software and Informatics, vol.3, issue.1, pp.89-120, 2009.

E. Paja, F. Dalpiaz, and P. Giorgini, Managing security requirements conflicts in sociotechnical systems, Conceptual Modeling, pp.270-283, 2013.

T. Li and J. Horkoff, Dealing with Security Requirements for Socio-Technical Systems: A Holistic Approach, p.14, 2014.
DOI : 10.1007/978-3-319-07881-6_20

T. Li and J. Mylopoulos, Modeling and applying security patterns using contextual goal models, the 7th International i* Workshop, 2014.

Y. Asnar, F. Massacci, A. Saidane, C. Riccucci, M. Felici et al., Organizational Patterns for Security and Dependability, International Journal of Secure Software Engineering, vol.2, issue.3, pp.1-22, 2011.
DOI : 10.4018/jsse.2011070101

E. B. Fernandez, M. Fonoage, M. Vanhilst, and M. Marta, The Secure Three-Tier Architecture Pattern, 2008 International Conference on Complex, Intelligent and Software Intensive Systems, pp.555-560, 2008.
DOI : 10.1109/CISIS.2008.51

M. Schumacher, E. Fernandez-buglioni, and D. Hybertson, Security Patterns, Informatik-Spektrum, vol.25, issue.3, 2006.
DOI : 10.1007/s002870200223

F. Buschmann, K. Henney, and D. Schimdt, Pattern-oriented Software Architecture: On Patterns and Pattern Language, 2007.

R. Ali, F. Dalpiaz, and P. Giorgini, A goal-based framework for contextual requirements modeling and analysis, Requirements Engineering, vol.17, issue.2, pp.439-458, 2010.
DOI : 10.1007/s00766-010-0110-z

A. Lapouchnian and J. Mylopoulos, Modeling Domain Variability in Requirements Engineering with Contexts, pp.115-130, 2009.
DOI : 10.1007/978-3-642-04840-1_11

P. Bresciani, A. Perini, P. Giorgini, F. Giunchiglia, and J. Mylopoulos, Tropos: An Agent-Oriented Software Development Methodology, Autonomous Agents and Multi-Agent Systems, vol.8, issue.3, pp.203-236, 2004.
DOI : 10.1023/B:AGNT.0000018806.20944.ef

D. Firesmith, Specifying Reusable Security Requirements., The Journal of Object Technology, vol.3, issue.1, pp.61-75, 2004.
DOI : 10.5381/jot.2004.3.1.c6

J. Horkoff and E. Yu, Comparison and evaluation of goal-oriented satisfaction analysis techniques, Requirements Engineering, vol.8, issue.1, pp.199-222, 2013.
DOI : 10.1007/s00766-011-0143-y

N. Niu and S. Easterbrook, So, you think you know others' goals? a repertory grid study. Software, IEEE, vol.24, issue.2, pp.53-61, 2007.

T. Li, J. Horkoff, and J. Mylopoulos, A prototype tool for modeling and analyzing security requirements from a holistic viewpoint, the CAiSE'14 Forum at the 26th International Conference on Advanced Information Systems Engineering, 2014.

H. Mouratidis, M. Weiss, and P. Giorgini, MODELING SECURE SYSTEMS USING AN AGENT-ORIENTED APPROACH AND SECURITY PATTERNS, International Journal of Software Engineering and Knowledge Engineering, vol.16, issue.03, p.471, 2006.
DOI : 10.1142/S0218194006002823

Y. Yu, H. Kaiya, H. Washizaki, Y. Xiong, Z. Hu et al., Enforcing a security pattern in stakeholder goal models, Proceedings of the 4th ACM workshop on Quality of protection, QoP '08, pp.9-14, 2008.
DOI : 10.1145/1456362.1456366

I. Araujo and M. Weiss, Linking patterns and non-functional requirements, Proceedings of the Ninth Conference on Pattern Language of Programs, 2002.

Y. Shiroma, H. Washizaki, Y. Fukazawa, A. Kubo, and N. Yoshioka, Model-Driven Security Patterns Application Based on Dependences among Patterns, 2010 International Conference on Availability, Reliability and Security, pp.2010-555, 2010.
DOI : 10.1109/ARES.2010.103

F. Sanchez-cid and A. Mana, SERENITY Pattern-Based Software Development Life-Cycle, 2008 19th International Conference on Database and Expert Systems Applications, pp.305-309, 2008.
DOI : 10.1109/DEXA.2008.119

D. Gross and E. Yu, From Non-Functional Requirements to Design through Patterns, Requirements Engineering, vol.6, issue.1, pp.18-36, 2001.
DOI : 10.1007/s007660170013

K. Supaporn, N. Prompoon, and T. Rojkangsadan, An approach: Constructing the grammar from security pattern, Proc. 4th International Joint Conference on Computer Science and Software Engineering, 2007.