Non-functional requirements in software engineering, 2000. ,
DOI : 10.1007/978-1-4615-5269-7
Weaving together requirements and architectures, Computer, vol.34, issue.3, pp.115-117, 2001. ,
DOI : 10.1109/2.910904
URL : http://oro.open.ac.uk/2213/1/00910904.pdf
Your "What" Is My "How": Iteration and Hierarchy in System Design, IEEE Software, vol.30, issue.2, pp.54-60, 2013. ,
DOI : 10.1109/MS.2012.173
Security Patterns, Informatik-Spektrum, vol.25, issue.3, 2005. ,
DOI : 10.1007/s002870200223
Problem-oriented security patterns for requirements engineering, Proceedings of the 19th European Conference on Pattern Languages of Programs, EuroPLoP '14, 2014. ,
DOI : 10.1145/2721956.2721963
Problem Frames Analyzing and structuring software development problems, 2001. ,
Making Pattern- and Model-Based Software Development More Rigorous, ICFEM'10, pp.253-269, 2010. ,
DOI : 10.1007/978-3-642-16901-4_18
Optimizing Functional and Quality Requirements According to Stakeholders??? Goals, System Quality and Software Architecture (SQSA, pp.75-120, 2014. ,
DOI : 10.1016/B978-0-12-417009-4.00004-1
A Method to Derive Software Architectures from Quality Requirements, 2011 18th Asia-Pacific Software Engineering Conference, pp.322-330, 2011. ,
DOI : 10.1109/APSEC.2011.29
A UML Profile for Requirements Analysis of Dependable Software, Proc. of the Int. Conf. on Computer Safety, Reliability and Security (SAFECOMP), ser. LNCS 6351, E. Schoitsch, pp.317-331, 2010. ,
DOI : 10.1007/978-3-642-15651-9_24
Requirements engineering, Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering, SIGSOFT '08/FSE-16, 2009. ,
DOI : 10.1145/1453101.1453133
Towards Systematic Integration of Quality Requirements into Software Architecture, Proc. of the 5th Europ. Conf. on Software Architecture (ECSA), ser. LNCS 6903, I. Crnkovic and V. Gruhn, pp.17-25, 2011. ,
DOI : 10.1002/int.20432
A Structured Approach for Eliciting, Modeling, and Using Quality-Related Domain Knowledge, Proc. of the 14th Int. Conf. on Computational Science and Its Applications (ICCSA), ser. LNCS 8583, pp.370-386, 2014. ,
DOI : 10.1007/978-3-319-09156-3_27
Reasoning About Alternative Requirements Options, Conceptual Modeling: Foundations and Applications, pp.380-397, 2009. ,
DOI : 10.1109/TSE.1977.229900
Software Architecture in Practice, SEI Series in Software Engineering, 2003. ,
Protection profile for the gateway of a smart metering system, BSI, Tech. Rep, 2011. ,
The Security Twin Peaks, Proc. of the Int. Symposium on Engineering Secure Software and Systems (ESSoS), ser. LNCS 6542, pp.167-180, 2011. ,
DOI : 10.1007/978-3-642-19125-1_13
URL : http://oro.open.ac.uk/28408/1/security_twin_peaks.pdf
Requirements engineering, Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering, SIGSOFT '08/FSE-16, 2009. ,
DOI : 10.1145/1453101.1453133
Deriving security requirements from crosscutting threat descriptions, Proceedings of the 3rd international conference on Aspect-oriented software development , AOSD '04, pp.112-121, 2004. ,
DOI : 10.1145/976270.976285
Effective Security Impact Analysis with Patterns for Software Enhancement, 2011 Sixth International Conference on Availability, Reliability and Security, pp.527-534, 2011. ,
DOI : 10.1109/ARES.2011.79
An aspect-oriented approach to relating security requirements and access control, Proc. of the CAiSE Forum, ser. CEUR Workshop Proceedings, pp.15-22, 2012. ,
Architecture-driven problem decomposition, Proceedings. 12th IEEE International Requirements Engineering Conference, 2004., pp.80-89, 2004. ,
DOI : 10.1109/ICRE.2004.1335666
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.5605
Software Aechitecture: Perspectives on an emerging discipline, 1996. ,
Relating software requirements and architectures using problem frames, Proceedings IEEE Joint International Conference on Requirements Engineering, pp.137-144, 2002. ,
DOI : 10.1109/ICRE.2002.1048516
A system of security patterns, 2006. ,