N. Ahmed and R. Matulevi?ius, Securing business processes using security risk-oriented patterns, Computer Standards & Interfaces, vol.36, issue.4, pp.723-733, 2014.
DOI : 10.1016/j.csi.2013.12.007

N. Ahmed and R. Matulevi?ius, Presentation and Validation of Method for Security Requirements Elicitation from Business Processes, Information Systems Engineering in Complex Environments, 2015.
DOI : 10.1007/978-3-319-19270-3_2

R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 2008.

C. Bartelt, A. Rausch, and K. Rehfeldt, Quo vadis cyber-physical systems: research areas of cyber-physical ecosystems: a position paper, Proceedings of the 1st International Workshop on Control Theory for Software Engineering, CTSE 2015, pp.22-25, 2015.
DOI : 10.1145/1837274.1837462

P. Belobaba, A. Odoni, and C. Barnhart, The global airline industry, 2015.
DOI : 10.1002/9780470744734

E. Dubois, P. Heymans, N. Mayer, and R. Matulevi?ius, A Systematic Approach to Define the Domain of Information System Security Risk Management, pp.289-306, 2010.
DOI : 10.1007/978-3-642-12544-7_16

J. Jürjens, Secure System Development with UML, 2005.

L. Kutvonen, A. Norta, and S. Ruohomaa, Inter-enterprise Business Transaction Management in Open Service Ecosystems, 2012 IEEE 16th International Enterprise Distributed Object Computing Conference, pp.31-40, 2012.
DOI : 10.1109/EDOC.2012.14

M. Leonardi, E. Piracci, and G. Galati, ADS-B vulnerability to low cost jammers: Risk assessment and possible solutions, 2014 Tyrrhenian International Workshop on Digital Communications, Enhanced Surveillance of Aircraft and Vehicles (TIWDC/ESAV), pp.41-46, 2014.
DOI : 10.1109/TIWDC-ESAV.2014.6945445

S. Long, Socioanalytic methods: discovering the hidden in organisations and social systems, Karnac Books, 2013.

N. Maiden, C. Ncube, and J. Lockerbie, Inventing Requirements: Experiences with an Airport Operations System, Proceedings of REFSQ 2008, pp.58-72, 2008.
DOI : 10.1007/978-3-540-69062-7_6

F. Massacci, F. Paci, and A. Tedeschi, Assessing a requirements evolution approach: Empirical studies in the air traffic management domain, Journal of Systems and Software, vol.95, pp.70-88, 2014.
DOI : 10.1016/j.jss.2013.11.1098

N. Mayer, Model-based Management of Information System Security Risk, 2009.
URL : https://hal.archives-ouvertes.fr/tel-00402996

R. Nõukas, Service Brokering Environment for an Airline, 2015.

A. Norta, P. Grefen, and N. Narendra, A reference architecture for managing dynamic inter-organizational business processes, Data & Knowledge Engineering, vol.91, issue.0, pp.52-89, 2014.
DOI : 10.1016/j.datak.2014.04.001

A. Norta, L. Ma, Y. Duan, A. Rull, M. Kõlvart et al., eContractual choreography-language properties towards cross-organizational business collaboration, Journal of Internet Services and Applications, vol.44, issue.4, pp.1-23, 2015.
DOI : 10.1007/978-94-007-5583-3

URL : https://jisajournal.springeropen.com/track/pdf/10.1186/s13174-015-0023-7?site=jisajournal.springeropen.com

S. Samarütel, Revision of Security Risk-oriented Patterns for Distributed Systems, 2016.

K. Sampigethaya and R. Poovendran, Aviation Cyber???Physical Systems: Foundations for Future Aircraft and Air Transport, Proceedings of the IEEE, vol.101, issue.8, pp.1834-1855, 2013.
DOI : 10.1109/JPROC.2012.2235131

M. Schumacher, E. Fernandez, D. Hybertson, and F. Buschmann, Security Patterns, Informatik-Spektrum, vol.25, issue.3, 2005.
DOI : 10.1007/s002870200223

W. Shim, F. Massacci, A. Tedeschi, and A. Pollini, A Relative Cost-Benefit Approach for Evaluating Alternative Airport Security Policies, 2014 Ninth International Conference on Availability, Reliability and Security, pp.514-522, 2014.
DOI : 10.1109/ARES.2014.76

A. Shostack, Threat Modeling: Designing for Security, 2014.

A. V. Uzunov and E. B. Fernandez, An extensible pattern-based library and taxonomy of security threats for distributed systems, Computer Standards & Interfaces, vol.36, issue.4, pp.734-747, 2013.
DOI : 10.1016/j.csi.2013.12.008