Security requirements engineering: designing secure socio-technical systems, 2016. ,
Modeling security requirements through ownership, permission and delegation, 13th IEEE International Conference on Requirements Engineering (RE'05), pp.167-176, 2005. ,
DOI : 10.1109/RE.2005.43
Goal-oriented requirements analysis and reasoning in the Tropos methodology, Engineering Applications of Artificial Intelligence, vol.18, issue.2, pp.159-171, 2005. ,
DOI : 10.1016/j.engappai.2004.11.017
Towards the development of privacy-aware systems. Information and Software Technology 51, pp.337-350, 2009. ,
A framework for modeling privacy requirements in role engineering, Proc. of REFSQ, pp.137-146, 2003. ,
Privacy Design Strategies, IFIP International Information Security Conference, pp.446-459, 2014. ,
DOI : 10.1007/978-3-642-55415-5_38
URL : https://hal.archives-ouvertes.fr/hal-01370395
Addressing privacy requirements in system design: the PriS method, Requirements Engineering, vol.2, issue.1, pp.241-255, 2008. ,
DOI : 10.5381/jot.2003.2.1.c6
Specifying and Reasoning over Socio-Technical Security Requirements with STS-Tool, pp.504-507, 2013. ,
DOI : 10.1007/978-3-642-41924-9_45
Engineering Privacy, IEEE Transactions on Software Engineering, vol.35, issue.1, pp.67-82, 2009. ,
DOI : 10.1109/TSE.2008.88
Managing conflicts in goal-driven requirements engineering, IEEE Transactions on Software Engineering, vol.24, issue.11, pp.908-926, 1998. ,
DOI : 10.1109/32.730542
Modelling strategic relationships for process reengineering, Social Modeling for Requirements Engineering, vol.11, p.2011, 2011. ,