L. Chung, B. A. Nixon, E. Yu, and J. Mylopoulos, Non-functional requirements in software engineering, 2000.
DOI : 10.1007/978-1-4615-5269-7

B. Nuseibeh, Weaving together requirements and architectures, Computer, vol.34, issue.3, pp.115-117, 2001.
DOI : 10.1109/2.910904

URL : http://oro.open.ac.uk/2213/1/00910904.pdf

M. Whalen, A. Gacek, D. Cofer, A. Murugesan, M. Heimdahl et al., Your "What" Is My "How": Iteration and Hierarchy in System Design, IEEE Software, vol.30, issue.2, pp.54-60, 2013.
DOI : 10.1109/MS.2012.173

M. Schumacher, E. Fernandez-buglioni, D. Hybertson, F. Buschmann, and P. Sommerlad, Security Patterns, Informatik-Spektrum, vol.25, issue.3, 2005.
DOI : 10.1007/s002870200223

A. Alebrahim and M. Heisel, Problem-oriented security patterns for requirements engineering, Proceedings of the 19th European Conference on Pattern Languages of Programs, EuroPLoP '14, 2014.
DOI : 10.1145/2721956.2721963

M. Jackson, Problem Frames Analyzing and structuring software development problems, 2001.

D. Hatebur and M. Heisel, Making Pattern- and Model-Based Software Development More Rigorous, ICFEM'10, pp.253-269, 2010.
DOI : 10.1007/978-3-642-16901-4_18

A. Alebrahim, C. Choppy, S. Faßbender, and M. Heisel, Optimizing Functional and Quality Requirements According to Stakeholders??? Goals, System Quality and Software Architecture (SQSA, pp.75-120, 2014.
DOI : 10.1016/B978-0-12-417009-4.00004-1

A. Alebrahim, D. Hatebur, and M. Heisel, A Method to Derive Software Architectures from Quality Requirements, 2011 18th Asia-Pacific Software Engineering Conference, pp.322-330, 2011.
DOI : 10.1109/APSEC.2011.29

D. Hatebur and M. Heisel, A UML Profile for Requirements Analysis of Dependable Software, Proc. of the Int. Conf. on Computer Safety, Reliability and Security (SAFECOMP), ser. LNCS 6351, E. Schoitsch, pp.317-331, 2010.
DOI : 10.1007/978-3-642-15651-9_24

A. Lamsweerde, Requirements engineering, Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering, SIGSOFT '08/FSE-16, 2009.
DOI : 10.1145/1453101.1453133

A. Alebrahim, D. Hatebur, and M. Heisel, Towards Systematic Integration of Quality Requirements into Software Architecture, Proc. of the 5th Europ. Conf. on Software Architecture (ECSA), ser. LNCS 6903, I. Crnkovic and V. Gruhn, pp.17-25, 2011.
DOI : 10.1002/int.20432

A. Alebrahim, M. Heisel, and R. Meis, A Structured Approach for Eliciting, Modeling, and Using Quality-Related Domain Knowledge, Proc. of the 14th Int. Conf. on Computational Science and Its Applications (ICCSA), ser. LNCS 8583, pp.370-386, 2014.
DOI : 10.1007/978-3-319-09156-3_27

A. Lamsweerde, Reasoning About Alternative Requirements Options, Conceptual Modeling: Foundations and Applications, pp.380-397, 2009.
DOI : 10.1109/TSE.1977.229900

L. Bass, P. Clements, and R. Kazman, Software Architecture in Practice, SEI Series in Software Engineering, 2003.

H. Kreutzmann, S. Vollmer, N. Tekampe, and A. Abromeit, Protection profile for the gateway of a smart metering system, BSI, Tech. Rep, 2011.

T. Heyman, K. Yskout, R. Scandariato, H. Schmidt, and Y. Yu, The Security Twin Peaks, Proc. of the Int. Symposium on Engineering Secure Software and Systems (ESSoS), ser. LNCS 6542, pp.167-180, 2011.
DOI : 10.1007/978-3-642-19125-1_13

URL : http://oro.open.ac.uk/28408/1/security_twin_peaks.pdf

A. Van-lamsweerde, Requirements engineering, Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering, SIGSOFT '08/FSE-16, 2009.
DOI : 10.1145/1453101.1453133

C. B. Haley, R. C. Laney, and B. Nuseibeh, Deriving security requirements from crosscutting threat descriptions, Proceedings of the 3rd international conference on Aspect-oriented software development , AOSD '04, pp.112-121, 2004.
DOI : 10.1145/976270.976285

T. Okubo, H. Kaiya, and N. Yoshioka, Effective Security Impact Analysis with Patterns for Software Enhancement, 2011 Sixth International Conference on Availability, Reliability and Security, pp.527-534, 2011.
DOI : 10.1109/ARES.2011.79

A. Alebrahim, T. T. Tun, Y. Yu, M. Heisel, and B. Nuseibeh, An aspect-oriented approach to relating security requirements and access control, Proc. of the CAiSE Forum, ser. CEUR Workshop Proceedings, pp.15-22, 2012.

L. Rapanotti, J. G. Hall, M. Jackson, and B. Nuseibeh, Architecture-driven problem decomposition, Proceedings. 12th IEEE International Requirements Engineering Conference, 2004., pp.80-89, 2004.
DOI : 10.1109/ICRE.2004.1335666

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.5605

M. Shaw and G. Garlan, Software Aechitecture: Perspectives on an emerging discipline, 1996.

J. Hall, M. Jackson, R. Laney, B. Nuseibeh, and L. Rapanotti, Relating software requirements and architectures using problem frames, Proceedings IEEE Joint International Conference on Requirements Engineering, pp.137-144, 2002.
DOI : 10.1109/ICRE.2002.1048516

K. Yskout, T. Heyman, R. Scandariato, and W. Joosen, A system of security patterns, 2006.