23.02.2015 Views

D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange

D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange

D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3. Bzivin, J., Dup, G., Jouault, F., Pitette, G., Rougui, J.E.: First experiments with the ATL<br />

model transformation language: Transforming XSLT into XQuery. In: 2nd OOPSLA Workshop<br />

on Generative Techniques in the context of Model Driven Architecture (2003)<br />

4. Chechik, M., Lai, W., Nejati, S., Cabot, J., Diskin, Z., Easterbrook, S., Sabetzadeh, M., Salay,<br />

R.: Relationship-based change propagation: A case study. In: Proceedings of the 2009 ICSE<br />

Workshop on Modeling in Software Engineering. pp. 7–12. MISE’09, IEEE Computer Society,<br />

Washington, DC, USA (2009)<br />

5. Cleland-Huang, J., Settimi, R., BenKhadra, O., Berezhanskaya, E., Christina, S.: Goalcentric<br />

traceability for managing non-functional requirements. In: Proceedings of the 27th<br />

International Conference on Software Engineering. pp. 362–371. ICSE ’05, ACM, New<br />

York, NY, USA (2005)<br />

6. Natt och Dag, J., Regnell, B., Carlshamre, P., Andersson, M., Karlsson, J.: A feasibility study<br />

of automated natural language requirements analysis in market-driven development. Requir.<br />

Eng. 7(1), 20–33 (2002)<br />

7. Egyed, A., Grünbacher, P.: Automating requirements traceability: Beyond the record & replay<br />

paradigm. In: ASE. pp. 163–171 (2002)<br />

8. Elahi, G., Yu, E., Zannone, N.: A vulnerability-centric requirements engineering framework:<br />

analyzing security attacks, countermeasures, and requirements based on vulnerabilities. Requirements<br />

Engineering 15(1), 41–62 (2009)<br />

9. EUROCONTROL: ATM Strategy for the Years 2000+ (2003)<br />

10. Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Requirements engineering for trust<br />

management: model, methodology, and reasoning. International Journal of Information Security<br />

5(4), 257–274 (2006)<br />

11. Hayes, J.H., Dekhtyar, A., Sundaram, S.K.: Advancing candidate link generation for requirements<br />

tracing: The study of methods. IEEE Trans. Softw. Eng. 32, 4–19 (January 2006)<br />

12. IBM Rational DOORS, http://www-01.ibm.com/software/awdtools/doors/features/<br />

13. ISO: ISO 31000 Risk management – Principles and guidelines (2009)<br />

14. von Knethen, A., Grund, M.: Quatrace: A tool environment for (semi-) automatic impact<br />

analysis based on traces. In: ICSM. pp. 246–255 (2003)<br />

15. Lamsweerde, A.V.: Elaborating security requirements by construction of intentional antimodels.<br />

In: Software Engineering, 2004. ICSE 2004. Proceedings. 26th International Conference<br />

on. pp. 148–157 (2004)<br />

16. Li, T., Liu, L., Bryant, B.R.: Service Security Analysis Based on i*: An Approach from<br />

the Attacker Viewpoint. In: Security, Trust, and Privacy for Software Applications (STPSA<br />

2010). pp. 127–133. Seoul (2010)<br />

17. Lin, L., Prowell, S.J., Poore, J.H.: The impact of requirements changes on specifications and<br />

state machines. Softw. Pract. Exper. 39, 573–610 (2009)<br />

18. Liu, L., Yu, E., Mylopoulos, J.: Security and privacy requirements analysis within a social<br />

setting. Proc.of RE 3, 151–161 (2003)<br />

19. Lucia, A.D., Fasano, F., Oliveto, R., Tortora, G.: Recovering traceability links in software<br />

artifact management systems using information retrieval methods. ACM Trans. Softw. Eng.<br />

Methodol. 16 (2007)<br />

20. Lund, M.S., den Braber, F., Stølen, K.: Maintaining results from security assessments. In:<br />

7th European Conference on Software Maintenance and Reengineering. pp. 341–350. IEEE<br />

Computer Society (2003)<br />

21. Lund, M.S., Solhaug, B., Stølen, K.: Model-Driven Risk Analysis - The CORAS Approach.<br />

Springer Berlin Heidelberg, Berlin, Heidelberg (2011)<br />

22. Massacci, F., Mylopoulos, J., Zannone, N.: Security Requirements Engineering : The SI*<br />

Modeling Language and the Secure Tropos Methodology. In: Ras, Z., Tsay, L.S. (eds.) Advances<br />

in Intelligent Information Systems, Studies in Computational Intelligence, vol. 265,<br />

pp. 147–174. Springer Berlin / Heidelberg (2010)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!