D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange
D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange
D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
3. Bzivin, J., Dup, G., Jouault, F., Pitette, G., Rougui, J.E.: First experiments with the ATL<br />
model transformation language: Transforming XSLT into XQuery. In: 2nd OOPSLA Workshop<br />
on Generative Techniques in the context of Model Driven Architecture (2003)<br />
4. Chechik, M., Lai, W., Nejati, S., Cabot, J., Diskin, Z., Easterbrook, S., Sabetzadeh, M., Salay,<br />
R.: Relationship-based change propagation: A case study. In: Proceedings of the 2009 ICSE<br />
Workshop on Modeling in Software Engineering. pp. 7–12. MISE’09, IEEE Computer Society,<br />
Washington, DC, USA (2009)<br />
5. Cleland-Huang, J., Settimi, R., BenKhadra, O., Berezhanskaya, E., Christina, S.: Goalcentric<br />
traceability for managing non-functional requirements. In: Proceedings of the 27th<br />
International Conference on Software Engineering. pp. 362–371. ICSE ’05, ACM, New<br />
York, NY, USA (2005)<br />
6. Natt och Dag, J., Regnell, B., Carlshamre, P., Andersson, M., Karlsson, J.: A feasibility study<br />
of automated natural language requirements analysis in market-driven development. Requir.<br />
Eng. 7(1), 20–33 (2002)<br />
7. Egyed, A., Grünbacher, P.: Automating requirements traceability: Beyond the record & replay<br />
paradigm. In: ASE. pp. 163–171 (2002)<br />
8. Elahi, G., Yu, E., Zannone, N.: A vulnerability-centric requirements engineering framework:<br />
analyzing security attacks, countermeasures, and requirements based on vulnerabilities. Requirements<br />
Engineering 15(1), 41–62 (2009)<br />
9. EUROCONTROL: ATM Strategy for the Years 2000+ (2003)<br />
10. Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Requirements engineering for trust<br />
management: model, methodology, and reasoning. International Journal of Information Security<br />
5(4), 257–274 (2006)<br />
11. Hayes, J.H., Dekhtyar, A., Sundaram, S.K.: Advancing candidate link generation for requirements<br />
tracing: The study of methods. IEEE Trans. Softw. Eng. 32, 4–19 (January 2006)<br />
12. IBM Rational DOORS, http://www-01.ibm.com/software/awdtools/doors/features/<br />
13. ISO: ISO 31000 Risk management – Principles and guidelines (2009)<br />
14. von Knethen, A., Grund, M.: Quatrace: A tool environment for (semi-) automatic impact<br />
analysis based on traces. In: ICSM. pp. 246–255 (2003)<br />
15. Lamsweerde, A.V.: Elaborating security requirements by construction of intentional antimodels.<br />
In: Software Engineering, 2004. ICSE 2004. Proceedings. 26th International Conference<br />
on. pp. 148–157 (2004)<br />
16. Li, T., Liu, L., Bryant, B.R.: Service Security Analysis Based on i*: An Approach from<br />
the Attacker Viewpoint. In: Security, Trust, and Privacy for Software Applications (STPSA<br />
2010). pp. 127–133. Seoul (2010)<br />
17. Lin, L., Prowell, S.J., Poore, J.H.: The impact of requirements changes on specifications and<br />
state machines. Softw. Pract. Exper. 39, 573–610 (2009)<br />
18. Liu, L., Yu, E., Mylopoulos, J.: Security and privacy requirements analysis within a social<br />
setting. Proc.of RE 3, 151–161 (2003)<br />
19. Lucia, A.D., Fasano, F., Oliveto, R., Tortora, G.: Recovering traceability links in software<br />
artifact management systems using information retrieval methods. ACM Trans. Softw. Eng.<br />
Methodol. 16 (2007)<br />
20. Lund, M.S., den Braber, F., Stølen, K.: Maintaining results from security assessments. In:<br />
7th European Conference on Software Maintenance and Reengineering. pp. 341–350. IEEE<br />
Computer Society (2003)<br />
21. Lund, M.S., Solhaug, B., Stølen, K.: Model-Driven Risk Analysis - The CORAS Approach.<br />
Springer Berlin Heidelberg, Berlin, Heidelberg (2011)<br />
22. Massacci, F., Mylopoulos, J., Zannone, N.: Security Requirements Engineering : The SI*<br />
Modeling Language and the Secure Tropos Methodology. In: Ras, Z., Tsay, L.S. (eds.) Advances<br />
in Intelligent Information Systems, Studies in Computational Intelligence, vol. 265,<br />
pp. 147–174. Springer Berlin / Heidelberg (2010)