Organizing Security Patterns, IEEE Software, vol.24, issue.4, pp.52-60, 2007. ,
DOI : 10.1109/MS.2007.114
Architecting software with security patterns, 2008. ,
Security patterns in practice: designing secure architectures using software patterns, 2013. ,
SECURE TROPOS: A SECURITY-ORIENTED EXTENSION OF THE TROPOS METHODOLOGY, International Journal of Software Engineering and Knowledge Engineering, vol.17, issue.02, pp.285-309, 2007. ,
DOI : 10.1142/S0218194007003240
Secure-i*: Engineering secure software systems through social analysis, Int. J. Software and Informatics, vol.3, issue.1, pp.89-120, 2009. ,
Managing security requirements conflicts in sociotechnical systems, Conceptual Modeling, pp.270-283, 2013. ,
Dealing with Security Requirements for Socio-Technical Systems: A Holistic Approach, p.14, 2014. ,
DOI : 10.1007/978-3-319-07881-6_20
Modeling and applying security patterns using contextual goal models, the 7th International i* Workshop, 2014. ,
Organizational Patterns for Security and Dependability, International Journal of Secure Software Engineering, vol.2, issue.3, pp.1-22, 2011. ,
DOI : 10.4018/jsse.2011070101
The Secure Three-Tier Architecture Pattern, 2008 International Conference on Complex, Intelligent and Software Intensive Systems, pp.555-560, 2008. ,
DOI : 10.1109/CISIS.2008.51
Security Patterns, Informatik-Spektrum, vol.25, issue.3, 2006. ,
DOI : 10.1007/s002870200223
Pattern-oriented Software Architecture: On Patterns and Pattern Language, 2007. ,
A goal-based framework for contextual requirements modeling and analysis, Requirements Engineering, vol.17, issue.2, pp.439-458, 2010. ,
DOI : 10.1007/s00766-010-0110-z
Modeling Domain Variability in Requirements Engineering with Contexts, pp.115-130, 2009. ,
DOI : 10.1007/978-3-642-04840-1_11
Tropos: An Agent-Oriented Software Development Methodology, Autonomous Agents and Multi-Agent Systems, vol.8, issue.3, pp.203-236, 2004. ,
DOI : 10.1023/B:AGNT.0000018806.20944.ef
Specifying Reusable Security Requirements., The Journal of Object Technology, vol.3, issue.1, pp.61-75, 2004. ,
DOI : 10.5381/jot.2004.3.1.c6
Comparison and evaluation of goal-oriented satisfaction analysis techniques, Requirements Engineering, vol.8, issue.1, pp.199-222, 2013. ,
DOI : 10.1007/s00766-011-0143-y
So, you think you know others' goals? a repertory grid study. Software, IEEE, vol.24, issue.2, pp.53-61, 2007. ,
A prototype tool for modeling and analyzing security requirements from a holistic viewpoint, the CAiSE'14 Forum at the 26th International Conference on Advanced Information Systems Engineering, 2014. ,
MODELING SECURE SYSTEMS USING AN AGENT-ORIENTED APPROACH AND SECURITY PATTERNS, International Journal of Software Engineering and Knowledge Engineering, vol.16, issue.03, p.471, 2006. ,
DOI : 10.1142/S0218194006002823
Enforcing a security pattern in stakeholder goal models, Proceedings of the 4th ACM workshop on Quality of protection, QoP '08, pp.9-14, 2008. ,
DOI : 10.1145/1456362.1456366
Linking patterns and non-functional requirements, Proceedings of the Ninth Conference on Pattern Language of Programs, 2002. ,
Model-Driven Security Patterns Application Based on Dependences among Patterns, 2010 International Conference on Availability, Reliability and Security, pp.2010-555, 2010. ,
DOI : 10.1109/ARES.2010.103
SERENITY Pattern-Based Software Development Life-Cycle, 2008 19th International Conference on Database and Expert Systems Applications, pp.305-309, 2008. ,
DOI : 10.1109/DEXA.2008.119
From Non-Functional Requirements to Design through Patterns, Requirements Engineering, vol.6, issue.1, pp.18-36, 2001. ,
DOI : 10.1007/s007660170013
An approach: Constructing the grammar from security pattern, Proc. 4th International Joint Conference on Computer Science and Software Engineering, 2007. ,