Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Travis D. Breaux
@article{DBLP:journals/tse/ShenB24, author = {Yuchen Shen and Travis D. Breaux}, title = {Stakeholder Preference Extraction From Scenarios}, journal = {{IEEE} Trans. Software Eng.}, volume = {50}, number = {1}, pages = {69--84}, year = {2024}, url = {https://doi.org/10.1109/TSE.2023.3333265}, doi = {10.1109/TSE.2023.3333265}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tse/ShenB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/RobolBPG23, author = {Marco Robol and Travis D. Breaux and Elda Paja and Paolo Giorgini}, title = {Consent Verification Monitoring}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {32}, number = {1}, pages = {2:1--2:33}, year = {2023}, url = {https://doi.org/10.1145/3490754}, doi = {10.1145/3490754}, timestamp = {Sun, 16 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/RobolBPG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/ZhangHSNBW23, author = {Xueling Zhang and John Heaps and Rocky Slavin and Jianwei Niu and Travis D. Breaux and Xiaoyin Wang}, title = {{DAISY:} Dynamic-Analysis-Induced Source Discovery for Sensitive Data}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {32}, number = {4}, pages = {89:1--89:34}, year = {2023}, url = {https://doi.org/10.1145/3569936}, doi = {10.1145/3569936}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/ZhangHSNBW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/BreauxM23, author = {Travis D. Breaux and Jennifer Moritz}, title = {A Metric for Measuring Software Engineering Post-Graduate Outcomes}, booktitle = {45th {IEEE/ACM} International Conference on Software Engineering: Software Engineering Education and Training, SEET@ICSE 2023, Melbourne, Australia, May 14-20, 2023}, pages = {283--295}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICSE-SEET58685.2023.00032}, doi = {10.1109/ICSE-SEET58685.2023.00032}, timestamp = {Thu, 20 Jul 2023 08:23:52 +0200}, biburl = {https://dblp.org/rec/conf/icse/BreauxM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/HuangKHB23, author = {Tianjian Huang and Vaishnavi Kaulagi and Mitra Bokaei Hosseini and Travis D. Breaux}, editor = {Kurt Schneider and Fabiano Dalpiaz and Jennifer Horkoff}, title = {Mobile Application Privacy Risk Assessments from User-authored Scenarios}, booktitle = {31st {IEEE} International Requirements Engineering Conference, {RE} 2023, Hannover, Germany, September 4-8, 2023}, pages = {17--28}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/RE57278.2023.00012}, doi = {10.1109/RE57278.2023.00012}, timestamp = {Fri, 06 Oct 2023 16:02:57 +0200}, biburl = {https://dblp.org/rec/conf/re/HuangKHB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HibshiJB22, author = {Hanan Hibshi and Stephanie T. Jones and Travis D. Breaux}, title = {A Systemic Approach for Natural Language Scenario Elicitation of Security Requirements}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {6}, pages = {3579--3591}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3103109}, doi = {10.1109/TDSC.2021.3103109}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/HibshiJB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/BreauxN22, author = {Travis D. Breaux and Thomas B. Norton}, title = {Legal Accountability as Software Quality: {A} {U.S.} Data Processing Perspective}, booktitle = {30th {IEEE} International Requirements Engineering Conference, {RE} 2022, Melbourne, Australia, August 15-19, 2022}, pages = {101--113}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/RE54965.2022.00016}, doi = {10.1109/RE54965.2022.00016}, timestamp = {Wed, 26 Oct 2022 19:40:33 +0200}, biburl = {https://dblp.org/rec/conf/re/BreauxN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/ShenB22, author = {Yuchen Shen and Travis D. Breaux}, title = {Domain Model Extraction from User-authored Scenarios and Word Embeddings}, booktitle = {30th {IEEE} International Requirements Engineering Conference Workshops, {RE} 2022 - Workshops, Melbourne, Australia, August 15-19, 2022}, pages = {143--151}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/REW56159.2022.00036}, doi = {10.1109/REW56159.2022.00036}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/re/ShenB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-06406, author = {Marco Robol and Travis D. Breaux and Elda Paja and Paolo Giorgini}, title = {Consent verification monitoring}, journal = {CoRR}, volume = {abs/2206.06406}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.06406}, doi = {10.48550/ARXIV.2206.06406}, eprinttype = {arXiv}, eprint = {2206.06406}, timestamp = {Tue, 21 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-06406.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BreauxM21, author = {Travis D. Breaux and Jennifer Moritz}, title = {The 2021 software developer shortage is coming}, journal = {Commun. {ACM}}, volume = {64}, number = {7}, pages = {39--41}, year = {2021}, url = {https://doi.org/10.1145/3440753}, doi = {10.1145/3440753}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/BreauxM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/HosseiniBSNW21, author = {Mitra Bokaei Hosseini and Travis D. Breaux and Rocky Slavin and Jianwei Niu and Xiaoyin Wang}, title = {Analyzing privacy policies through syntax-driven semantic analysis of information types}, journal = {Inf. Softw. Technol.}, volume = {138}, pages = {106608}, year = {2021}, url = {https://doi.org/10.1016/j.infsof.2021.106608}, doi = {10.1016/J.INFSOF.2021.106608}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/HosseiniBSNW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/HosseiniHS0B21, author = {Mitra Bokaei Hosseini and John Heaps and Rocky Slavin and Jianwei Niu and Travis D. Breaux}, title = {Ambiguity and Generality in Natural Language Privacy Policies}, booktitle = {29th {IEEE} International Requirements Engineering Conference, {RE} 2021, Notre Dame, IN, USA, September 20-24, 2021}, pages = {70--81}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/RE51729.2021.00014}, doi = {10.1109/RE51729.2021.00014}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/re/HosseiniHS0B21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/refsq/2021w, editor = {Fatma Basak Aydemir and Catarina Gralha and Maya Daneva and Eduard C. Groen and Andrea Herrmann and Patrick Mennig and Sallam Abualhaija and Alessio Ferrari and Jin Guo and Renata S. S. Guizzardi and Jennifer Horkoff and Anna Perini and Angelo Susi and Travis D. Breaux and Xavier Franch and Neil A. Ernst and Elda Paja and Norbert Seyff}, title = {Joint Proceedings of {REFSQ} 2021 Workshops, OpenRE, Poster and Tools Track, and Doctoral Symposium co-located with the 27th International Conference on Requirements Engineering: Foundation for Software Quality {(REFSQ} 2021), Essen, Germany, April 12, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2857}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2857}, urn = {urn:nbn:de:0074-2857-1}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/refsq/2021w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/ZhangWSBN20, author = {Xueling Zhang and Xiaoyin Wang and Rocky Slavin and Travis D. Breaux and Jianwei Niu}, editor = {Gregg Rothermel and Doo{-}Hwan Bae}, title = {How does misconfiguration of analytic services compromise mobile privacy?}, booktitle = {{ICSE} '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June - 19 July, 2020}, pages = {1572--1583}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377811.3380401}, doi = {10.1145/3377811.3380401}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/ZhangWSBN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/refsq/HosseiniSBW020, author = {Mitra Bokaei Hosseini and Rocky Slavin and Travis D. Breaux and Xiaoyin Wang and Jianwei Niu}, editor = {Nazim H. Madhavji and Liliana Pasquale and Alessio Ferrari and Stefania Gnesi}, title = {Disambiguating Requirements Through Syntax-Driven Semantic Analysis of Information Types}, booktitle = {Requirements Engineering: Foundation for Software Quality - 26th International Working Conference, {REFSQ} 2020, Pisa, Italy, March 24-27, 2020, Proceedings {[REFSQ} 2020 was postponed]}, series = {Lecture Notes in Computer Science}, volume = {12045}, pages = {97--115}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-44429-7\_7}, doi = {10.1007/978-3-030-44429-7\_7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/refsq/HosseiniSBW020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/re/2020, editor = {Travis D. Breaux and Andrea Zisman and Samuel Fricker and Martin Glinz}, title = {28th {IEEE} International Requirements Engineering Conference, {RE} 2020, Zurich, Switzerland, August 31 - September 4, 2020}, publisher = {{IEEE}}, year = {2020}, url = {https://ieeexplore.ieee.org/xpl/conhome/9211511/proceeding}, isbn = {978-1-7281-7438-9}, timestamp = {Wed, 14 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/re/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/CaramujoSMRCB19, author = {Jo{\~{a}}o Caramujo and Alberto Rodrigues da Silva and Shaghayegh Monfared and Andr{\'{e}} Ribeiro and P{\'{a}}vel Calado and Travis D. Breaux}, title = {RSL-IL4Privacy: a domain-specific language for the rigorous specification of privacy policies}, journal = {Requir. Eng.}, volume = {24}, number = {1}, pages = {1--26}, year = {2019}, url = {https://doi.org/10.1007/s00766-018-0305-2}, doi = {10.1007/S00766-018-0305-2}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/CaramujoSMRCB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/BhatiaEB19, author = {Jaspreet Bhatia and Morgan C. Evans and Travis D. Breaux}, title = {Identifying incompleteness in privacy policy goals using semantic frames}, journal = {Requir. Eng.}, volume = {24}, number = {3}, pages = {291--313}, year = {2019}, url = {https://doi.org/10.1007/s00766-019-00315-y}, doi = {10.1007/S00766-019-00315-Y}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/BhatiaEB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/QinNGWB019, author = {Xue Qin and Robert Neuhaus and Diego Gonzales and Xiaoyin Wang and Travis D. Breaux and Jianwei Niu}, editor = {Xenofon D. Koutsoukos and Alvaro A. C{\'{a}}rdenas and Ehab Al{-}Shaer}, title = {Taming web views in the detection of Android privacy leaks}, booktitle = {Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019}, pages = {23:1--23:2}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3314058.3317732}, doi = {10.1145/3314058.3317732}, timestamp = {Sat, 22 Jun 2019 19:13:09 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/QinNGWB019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/HeapsZWB019, author = {John Heaps and Xueling Zhang and Xiaoyin Wang and Travis D. Breaux and Jianwei Niu}, editor = {Xenofon D. Koutsoukos and Alvaro A. C{\'{a}}rdenas and Ehab Al{-}Shaer}, title = {Toward a reliability measurement framework automated using deep learning}, booktitle = {Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019}, pages = {25:1--25:2}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3314058.3317733}, doi = {10.1145/3314058.3317733}, timestamp = {Sat, 22 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/HeapsZWB019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/RobolBPG19, author = {Marco Robol and Travis D. Breaux and Elda Paja and Paolo Giorgini}, editor = {Daniela E. Damian and Anna Perini and Seok{-}Won Lee}, title = {Consent Verification Under Evolving Privacy Policies}, booktitle = {27th {IEEE} International Requirements Engineering Conference, {RE} 2019, Jeju Island, Korea (South), September 23-27, 2019}, pages = {422--427}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/RE.2019.00056}, doi = {10.1109/RE.2019.00056}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/re/RobolBPG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/HeapsWB019, author = {John Heaps and Xiaoyin Wang and Travis D. Breaux and Jianwei Niu}, editor = {Florian Kerschbaum and Atefeh Mashatan and Jianwei Niu and Adam J. Lee}, title = {Toward Detection of Access Control Models from Source Code via Word Embedding}, booktitle = {Proceedings of the 24th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2019, Toronto, ON, Canada, June 03-06, 2019}, pages = {103--112}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3322431.3326329}, doi = {10.1145/3322431.3326329}, timestamp = {Sun, 02 Jun 2019 13:58:07 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/HeapsWB019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tochi/BhatiaB18, author = {Jaspreet Bhatia and Travis D. Breaux}, title = {Empirical Measurement of Perceived Privacy Risk}, journal = {{ACM} Trans. Comput. Hum. Interact.}, volume = {25}, number = {6}, pages = {34:1--34:47}, year = {2018}, url = {https://doi.org/10.1145/3267808}, doi = {10.1145/3267808}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tochi/BhatiaB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/WangQHSB018, author = {Xiaoyin Wang and Xue Qin and Mitra Bokaei Hosseini and Rocky Slavin and Travis D. Breaux and Jianwei Niu}, editor = {Michel Chaudron and Ivica Crnkovic and Marsha Chechik and Mark Harman}, title = {GUILeak: tracing privacy policy claims on user input data for Android applications}, booktitle = {Proceedings of the 40th International Conference on Software Engineering, {ICSE} 2018, Gothenburg, Sweden, May 27 - June 03, 2018}, pages = {37--47}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3180155.3180196}, doi = {10.1145/3180155.3180196}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/WangQHSB018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/BhatiaB18, author = {Jaspreet Bhatia and Travis D. Breaux}, editor = {Guenther Ruhe and Walid Maalej and Daniel Amyot}, title = {Semantic Incompleteness in Privacy Policy Goals}, booktitle = {26th {IEEE} International Requirements Engineering Conference, {RE} 2018, Banff, AB, Canada, August 20-24, 2018}, pages = {159--169}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/RE.2018.00025}, doi = {10.1109/RE.2018.00025}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/BhatiaB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/refsq/HosseiniB018, author = {Mitra Bokaei Hosseini and Travis D. Breaux and Jianwei Niu}, editor = {Erik Kamsties and Jennifer Horkoff and Fabiano Dalpiaz}, title = {Inferring Ontology Fragments from Semantic Role Typing of Lexical Variants}, booktitle = {Requirements Engineering: Foundation for Software Quality - 24th International Working Conference, {REFSQ} 2018, Utrecht, The Netherlands, March 19-22, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10753}, pages = {39--56}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-77243-1\_3}, doi = {10.1007/978-3-319-77243-1\_3}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/refsq/HosseiniB018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/HibshiB17, author = {Hanan Hibshi and Travis D. Breaux}, editor = {Ana Moreira and Jo{\~{a}}o Ara{\'{u}}jo and Jane Hayes and Barbara Paech}, title = {Reinforcing Security Requirements with Multifactor Quality Measurement}, booktitle = {25th {IEEE} International Requirements Engineering Conference, {RE} 2017, Lisbon, Portugal, September 4-8, 2017}, pages = {144--153}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/RE.2017.77}, doi = {10.1109/RE.2017.77}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/HibshiB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/EvansBWB17, author = {Morgan C. Evans and Jaspreet Bhatia and Sudarshan Wadkar and Travis D. Breaux}, editor = {Ana Moreira and Jo{\~{a}}o Ara{\'{u}}jo and Jane Hayes and Barbara Paech}, title = {An Evaluation of Constituency-Based Hyponymy Extraction from Privacy Policies}, booktitle = {25th {IEEE} International Requirements Engineering Conference, {RE} 2017, Lisbon, Portugal, September 4-8, 2017}, pages = {312--321}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/RE.2017.87}, doi = {10.1109/RE.2017.87}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/EvansBWB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/BhatiaB17, author = {Jaspreet Bhatia and Travis D. Breaux}, editor = {Ana Moreira and Jo{\~{a}}o Ara{\'{u}}jo and Jane Hayes and Barbara Paech}, title = {A Data Purpose Case Study of Privacy Policies}, booktitle = {25th {IEEE} International Requirements Engineering Conference, {RE} 2017, Lisbon, Portugal, September 4-8, 2017}, pages = {394--399}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/RE.2017.56}, doi = {10.1109/RE.2017.56}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/BhatiaB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/HibshiBRW16, author = {Hanan Hibshi and Travis D. Breaux and Maria Riaz and Laurie A. Williams}, title = {A grounded analysis of experts' decision-making during security assessments}, journal = {J. Cybersecur.}, volume = {2}, number = {2}, pages = {147--163}, year = {2016}, url = {https://doi.org/10.1093/cybsec/tyw010}, doi = {10.1093/CYBSEC/TYW010}, timestamp = {Mon, 07 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/HibshiBRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/SchaubBS16, author = {Florian Schaub and Travis D. Breaux and Norman M. Sadeh}, title = {Crowdsourcing privacy policy analysis: Potential, challenges and best practices}, journal = {it Inf. Technol.}, volume = {58}, number = {5}, pages = {229--236}, year = {2016}, url = {https://doi.org/10.1515/itit-2016-0009}, doi = {10.1515/ITIT-2016-0009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/it/SchaubBS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/BhatiaBS16, author = {Jaspreet Bhatia and Travis D. Breaux and Florian Schaub}, title = {Mining Privacy Goals from Privacy Policies Using Hybridized Task Recomposition}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {25}, number = {3}, pages = {22:1--22:24}, year = {2016}, url = {https://doi.org/10.1145/2907942}, doi = {10.1145/2907942}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/BhatiaBS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaaifs/HosseiniWB016, author = {Mitra Bokaei Hosseini and Sudarshan Wadkar and Travis D. Breaux and Jianwei Niu}, title = {Lexical Similarity of Information Type Hypernyms, Meronyms and Synonyms in Privacy Policies}, booktitle = {2016 {AAAI} Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016}, publisher = {{AAAI} Press}, year = {2016}, url = {http://aaai.org/ocs/index.php/FSS/FSS16/paper/view/14139}, timestamp = {Wed, 14 Nov 2018 14:49:10 +0100}, biburl = {https://dblp.org/rec/conf/aaaifs/HosseiniWB016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BhatiaBFHS16, author = {Jaspreet Bhatia and Travis D. Breaux and Liora Friedberg and Hanan Hibshi and Daniel Smullen}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and Erik{-}Oliver Blass and Florian Kerschbaum}, title = {Privacy Risk in Cybersecurity Data Sharing}, booktitle = {Proceedings of the 2016 {ACM} on Workshop on Information Sharing and Collaborative Security, {WISCS} 2016, Vienna, Austria, October 24 - 28, 2016}, pages = {57--64}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2994541}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BhatiaBFHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/SmullenB16, author = {Daniel Smullen and Travis D. Breaux}, editor = {William L. Scherlis and David Brumley}, title = {Modeling, analyzing, and consistency checking privacy requirements using eddy}, booktitle = {Proceedings of the Symposium and Bootcamp on the Science of Security, Pittsburgh, PA, USA, April 19-21, 2016}, pages = {118--120}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2898375.2898381}, doi = {10.1145/2898375.2898381}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/SmullenB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/SilvaCMCB16, author = {Alberto Rodrigues da Silva and Jo{\~{a}}o Caramujo and Shaghayegh Monfared and P{\'{a}}vel Calado and Travis D. Breaux}, editor = {Slimane Hammoudi and Leszek A. Maciaszek and Michele Missikoff and Olivier Camp and Jos{\'{e}} Cordeiro}, title = {Improving the Specification and Analysis of Privacy Policies - The RSLingo4Privacy Approach}, booktitle = {{ICEIS} 2016 - Proceedings of the 18th International Conference on Enterprise Information Systems, Volume 1, Rome, Italy, April 25-28, 2016}, pages = {336--347}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005870503360347}, doi = {10.5220/0005870503360347}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iceis/SilvaCMCB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/SlavinWHHKBBN16, author = {Rocky Slavin and Xiaoyin Wang and Mitra Bokaei Hosseini and James Hester and Ram Krishnan and Jaspreet Bhatia and Travis D. Breaux and Jianwei Niu}, editor = {Laura K. Dillon and Willem Visser and Laurie A. Williams}, title = {Toward a framework for detecting privacy policy violations in android application code}, booktitle = {Proceedings of the 38th International Conference on Software Engineering, {ICSE} 2016, Austin, TX, USA, May 14-22, 2016}, pages = {25--36}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2884781.2884855}, doi = {10.1145/2884781.2884855}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/SlavinWHHKBBN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/SlavinWHHKBBN16a, author = {Rocky Slavin and Xiaoyin Wang and Mitra Bokaei Hosseini and James Hester and Ram Krishnan and Jaspreet Bhatia and Travis D. Breaux and Jianwei Niu}, title = {PVDetector: a detector of privacy-policy violations for Android apps}, booktitle = {Proceedings of the International Conference on Mobile Software Engineering and Systems, MOBILESoft '16, Austin, Texas, USA, May 14-22, 2016}, pages = {299--300}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897073.2897720}, doi = {10.1145/2897073.2897720}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/SlavinWHHKBBN16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/BhatiaEWB16, author = {Jaspreet Bhatia and Morgan C. Evans and Sudarshan Wadkar and Travis D. Breaux}, title = {Automated Extraction of Regulated Information Types Using Hyponymy Relations}, booktitle = {24th {IEEE} International Requirements Engineering Conference, {RE} 2016, Beijing, China, September 12-16, 2016}, pages = {19--25}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/REW.2016.018}, doi = {10.1109/REW.2016.018}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/BhatiaEWB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/BhatiaBRN16, author = {Jaspreet Bhatia and Travis D. Breaux and Joel R. Reidenberg and Thomas B. Norton}, title = {A Theory of Vagueness and Privacy Risk Perception}, booktitle = {24th {IEEE} International Requirements Engineering Conference, {RE} 2016, Beijing, China, September 12-16, 2016}, pages = {26--35}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/RE.2016.20}, doi = {10.1109/RE.2016.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/BhatiaBRN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssci/HibshiBW16, author = {Hanan Hibshi and Travis D. Breaux and Christian Wagner}, title = {Improving security requirements adequacy}, booktitle = {2016 {IEEE} Symposium Series on Computational Intelligence, {SSCI} 2016, Athens, Greece, December 6-9, 2016}, pages = {1--8}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/SSCI.2016.7849906}, doi = {10.1109/SSCI.2016.7849906}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssci/HibshiBW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/RiazBW15, author = {Maria Riaz and Travis D. Breaux and Laurie A. Williams}, title = {How have we evaluated software pattern application? {A} systematic mapping study of research design practices}, journal = {Inf. Softw. Technol.}, volume = {65}, pages = {14--38}, year = {2015}, url = {https://doi.org/10.1016/j.infsof.2015.04.002}, doi = {10.1016/J.INFSOF.2015.04.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/infsof/RiazBW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/BhatiaB15, author = {Jaspreet Bhatia and Travis D. Breaux}, title = {Towards an information type lexicon for privacy policies}, booktitle = {Eighth {IEEE} International Workshop on Requirements Engineering and Law, {RELAW} 2015, Ottawa, ON, Canada, August 25, 2015}, pages = {19--24}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/RELAW.2015.7330207}, doi = {10.1109/RELAW.2015.7330207}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/BhatiaB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/GhanavatiB15, author = {Sepideh Ghanavati and Travis D. Breaux}, title = {Comparing and analyzing definitions in multi-jurisdictions}, booktitle = {Eighth {IEEE} International Workshop on Requirements Engineering and Law, {RELAW} 2015, Ottawa, ON, Canada, August 25, 2015}, pages = {47--56}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/RELAW.2015.7330211}, doi = {10.1109/RELAW.2015.7330211}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/re/GhanavatiB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/HibshiBB15, author = {Hanan Hibshi and Travis D. Breaux and Stephen B. Broomell}, editor = {Didar Zowghi and Vincenzo Gervasi and Daniel Amyot}, title = {Assessment of risk perception in security requirements composition}, booktitle = {23rd {IEEE} International Requirements Engineering Conference, {RE} 2015, Ottawa, ON, Canada, August 24-28, 2015}, pages = {146--155}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/RE.2015.7320417}, doi = {10.1109/RE.2015.7320417}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/HibshiBB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/BreauxSH15, author = {Travis D. Breaux and Daniel Smullen and Hanan Hibshi}, editor = {Didar Zowghi and Vincenzo Gervasi and Daniel Amyot}, title = {Detecting repurposing and over-collection in multi-party privacy requirements specifications}, booktitle = {23rd {IEEE} International Requirements Engineering Conference, {RE} 2015, Ottawa, ON, Canada, August 24-28, 2015}, pages = {166--175}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/RE.2015.7320419}, doi = {10.1109/RE.2015.7320419}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/BreauxSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/BreauxHR14, author = {Travis D. Breaux and Hanan Hibshi and Ashwini Rao}, title = {Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements}, journal = {Requir. Eng.}, volume = {19}, number = {3}, pages = {281--307}, year = {2014}, url = {https://doi.org/10.1007/s00766-013-0190-7}, doi = {10.1007/S00766-013-0190-7}, timestamp = {Thu, 08 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/BreauxHR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/software/Breaux14, author = {Travis D. Breaux}, title = {Privacy Requirements in an Age of Increased Sharing}, journal = {{IEEE} Softw.}, volume = {31}, number = {5}, pages = {24--27}, year = {2014}, url = {https://doi.org/10.1109/MS.2014.118}, doi = {10.1109/MS.2014.118}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/software/Breaux14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hcomp/SchaubBS14, author = {Florian Schaub and Travis D. Breaux and Norman M. Sadeh}, editor = {Jeffrey P. Bigham and David C. Parkes}, title = {Crowdsourcing the Extraction of Data Practices from Privacy Policies}, booktitle = {Proceedings of the Seconf {AAAI} Conference on Human Computation and Crowdsourcing, {HCOMP} 2014, November 2-4, 2014, Pittsburgh, Pennsylvania, {USA}}, pages = {56--57}, publisher = {{AAAI}}, year = {2014}, url = {https://doi.org/10.1609/hcomp.v2i1.13190}, doi = {10.1609/HCOMP.V2I1.13190}, timestamp = {Tue, 05 Sep 2023 11:10:11 +0200}, biburl = {https://dblp.org/rec/conf/hcomp/SchaubBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/RaoHBLN14, author = {Ashwini Rao and Hanan Hibshi and Travis D. Breaux and Jean{-}Michel Lehker and Jianwei Niu}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Less is more?: investigating the role of examples in security studies using analogical transfer}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {7}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600182}, doi = {10.1145/2600176.2600182}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/RaoHBLN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/HibshiBRW14, author = {Hanan Hibshi and Travis D. Breaux and Maria Riaz and Laurie A. Williams}, editor = {Kristian Beckers and Shamal Faily and Seok{-}Won Lee and Nancy R. Mead}, title = {Towards a framework to measure security expertise in requirements analysis}, booktitle = {{IEEE} 1st Workshop on Evolving Security and Privacy Requirements Engineering, {ESPRE} 2014, 25 August, 2014, Karlskrona, Sweden}, pages = {13--18}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ESPRE.2014.6890522}, doi = {10.1109/ESPRE.2014.6890522}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/HibshiBRW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/BreauxS14, author = {Travis D. Breaux and Florian Schaub}, editor = {Tony Gorschek and Robyn R. Lutz}, title = {Scaling requirements extraction to the crowd: Experiments with privacy policies}, booktitle = {{IEEE} 22nd International Requirements Engineering Conference, {RE} 2014, Karlskrona, Sweden, August 25-29, 2014}, pages = {163--172}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/RE.2014.6912258}, doi = {10.1109/RE.2014.6912258}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/BreauxS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/SlavinLNB14, author = {Rocky Slavin and Jean{-}Michel Lehker and Jianwei Niu and Travis D. Breaux}, editor = {Tony Gorschek and Robyn R. Lutz}, title = {Managing security requirements patterns using feature diagram hierarchies}, booktitle = {{IEEE} 22nd International Requirements Engineering Conference, {RE} 2014, Karlskrona, Sweden, August 25-29, 2014}, pages = {193--202}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/RE.2014.6912261}, doi = {10.1109/RE.2014.6912261}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/re/SlavinLNB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/GordonB14, author = {David G. Gordon and Travis D. Breaux}, editor = {Tony Gorschek and Robyn R. Lutz}, title = {The role of legal expertise in interpretation of legal requirements and definitions}, booktitle = {{IEEE} 22nd International Requirements Engineering Conference, {RE} 2014, Karlskrona, Sweden, August 25-29, 2014}, pages = {273--282}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/RE.2014.6912269}, doi = {10.1109/RE.2014.6912269}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/GordonB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/re/2014relaw, editor = {Daniel Amyot and Annie I. Ant{\'{o}}n and Travis D. Breaux and Aaron K. Massey and Alberto Siena}, title = {{IEEE} 7th International Workshop on Requirements Engineering and Law, {RELAW} 2014, 26-26 August, 2014, Karlskrona, Sweden}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6887459/proceeding}, isbn = {978-1-4799-6325-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/re/2014relaw.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BreauxG13, author = {Travis D. Breaux and David G. Gordon}, title = {What Engineers Should Know about {US} Security and Privacy Law}, journal = {{IEEE} Secur. Priv.}, volume = {11}, number = {3}, pages = {72--76}, year = {2013}, url = {https://doi.org/10.1109/MSP.2013.74}, doi = {10.1109/MSP.2013.74}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BreauxG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/GordonB13, author = {David G. Gordon and Travis D. Breaux}, title = {A cross-domain empirical study and legal evaluation of the requirements water marking method}, journal = {Requir. Eng.}, volume = {18}, number = {2}, pages = {147--173}, year = {2013}, url = {https://doi.org/10.1007/s00766-013-0167-6}, doi = {10.1007/S00766-013-0167-6}, timestamp = {Thu, 08 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/GordonB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/BreauxGPP13, author = {Travis D. Breaux and David G. Gordon and Nick Papanikolaou and Siani Pearson}, editor = {Daniel Amyot and Annie I. Ant{\'{o}}n and Travis D. Breaux and Aaron K. Massey and Peter P. Swire}, title = {Mapping legal requirements to {IT} controls}, booktitle = {Sixth International Workshop on Requirements Engineering and Law, {RELAW} 2013, 16 July, 2013, Rio de Janeiro, Brasil}, pages = {11--20}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/RELAW.2013.6671341}, doi = {10.1109/RELAW.2013.6671341}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/BreauxGPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/BreauxR13, author = {Travis D. Breaux and Ashwini Rao}, title = {Formal analysis of privacy requirements specifications for multi-tier applications}, booktitle = {21st {IEEE} International Requirements Engineering Conference, {RE} 2013, Rio de Janeiro-RJ, Brazil, July 15-19, 2013}, pages = {14--20}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/RE.2013.6636701}, doi = {10.1109/RE.2013.6636701}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/BreauxR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/JuretaBSG13, author = {Ivan Jureta and Travis D. Breaux and Alberto Siena and David G. Gordon}, editor = {Daniel Amyot and Annie I. Ant{\'{o}}n and Travis D. Breaux and Aaron K. Massey and Peter P. Swire}, title = {Toward benchmarks to assess advancement in legal requirements modeling}, booktitle = {Sixth International Workshop on Requirements Engineering and Law, {RELAW} 2013, 16 July, 2013, Rio de Janeiro, Brasil}, pages = {25--33}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/RELAW.2013.6671343}, doi = {10.1109/RELAW.2013.6671343}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/JuretaBSG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/BreauxG13, author = {Travis D. Breaux and David G. Gordon}, editor = {Daniel Amyot and Annie I. Ant{\'{o}}n and Travis D. Breaux and Aaron K. Massey and Peter P. Swire}, title = {Preserving traceability and encoding meaning in legal requirements extraction}, booktitle = {Sixth International Workshop on Requirements Engineering and Law, {RELAW} 2013, 16 July, 2013, Rio de Janeiro, Brasil}, pages = {57--60}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/RELAW.2013.6671347}, doi = {10.1109/RELAW.2013.6671347}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/BreauxG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/GordonB13, author = {David G. Gordon and Travis D. Breaux}, title = {Assessing regulatory change through legal requirements coverage modeling}, booktitle = {21st {IEEE} International Requirements Engineering Conference, {RE} 2013, Rio de Janeiro-RJ, Brazil, July 15-19, 2013}, pages = {145--154}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/RE.2013.6636714}, doi = {10.1109/RE.2013.6636714}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/GordonB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/refsq/BreauxG13, author = {Travis D. Breaux and David G. Gordon}, editor = {J{\"{o}}rg D{\"{o}}rr and Andreas L. Opdahl}, title = {Regulatory Requirements Traceability and Analysis Using Semi-formal Specifications}, booktitle = {Requirements Engineering: Foundation for Software Quality - 19th International Working Conference, {REFSQ} 2013, Essen, Germany, April 8-11, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7830}, pages = {141--157}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-37422-7\_11}, doi = {10.1007/978-3-642-37422-7\_11}, timestamp = {Sat, 19 Oct 2019 20:28:57 +0200}, biburl = {https://dblp.org/rec/conf/refsq/BreauxG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/re/2013relaw, editor = {Daniel Amyot and Annie I. Ant{\'{o}}n and Travis D. Breaux and Aaron K. Massey and Peter P. Swire}, title = {Sixth International Workshop on Requirements Engineering and Law, {RELAW} 2013, 16 July, 2013, Rio de Janeiro, Brasil}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6656122/proceeding}, isbn = {978-1-4799-0950-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/re/2013relaw.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/BreauxHRL12, author = {Travis D. Breaux and Hanan Hibshi and Ashwini Rao and Jean{-}Michel Lehker}, title = {Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns}, booktitle = {Second {IEEE} International Workshop on Requirements Patterns, RePa 2012, Chicago, IL, USA, September 24, 2012}, pages = {41--47}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/RePa.2012.6359975}, doi = {10.1109/REPA.2012.6359975}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/BreauxHRL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/GordonB12, author = {David G. Gordon and Travis D. Breaux}, editor = {Mats Per Erik Heimdahl and Pete Sawyer}, title = {Reconciling multi-jurisdictional legal requirements: {A} case study in requirements water marking}, booktitle = {2012 20th {IEEE} International Requirements Engineering Conference (RE), Chicago, IL, USA, September 24-28, 2012}, pages = {91--100}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/RE.2012.6345843}, doi = {10.1109/RE.2012.6345843}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/GordonB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BreauxB11, author = {Travis D. Breaux and David L. Baumer}, title = {Legally "reasonable" security requirements: {A} 10-year {FTC} retrospective}, journal = {Comput. Secur.}, volume = {30}, number = {4}, pages = {178--193}, year = {2011}, url = {https://doi.org/10.1016/j.cose.2010.11.003}, doi = {10.1016/J.COSE.2010.11.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/BreauxB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/AntonBGM11, author = {Annie I. Ant{\'{o}}n and Travis D. Breaux and Stefanos Gritzalis and John Mylopoulos}, title = {Digital privacy: theory, policies and technologies}, journal = {Requir. Eng.}, volume = {16}, number = {1}, pages = {1--2}, year = {2011}, url = {https://doi.org/10.1007/s00766-011-0117-0}, doi = {10.1007/S00766-011-0117-0}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/AntonBGM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GordonB11, author = {David G. Gordon and Travis D. Breaux}, editor = {Christian Cachin and Thomas Ristenpart}, title = {Managing multi-jurisdictional requirements in the cloud: towards a computational legal landscape}, booktitle = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW} 2011, Chicago, IL, USA, October 21, 2011}, pages = {83--94}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046660.2046678}, doi = {10.1145/2046660.2046678}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GordonB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/BreauxA11, author = {Travis D. Breaux and Thomas A. Alspaugh}, title = {Governance and accountability in the new data ecology}, booktitle = {Fourth International Workshop on Requirements Engineering and Law, {RELAW} 2011, Trento, Italy, August 30, 2011}, pages = {5--14}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/RELAW.2011.6050267}, doi = {10.1109/RELAW.2011.6050267}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/BreauxA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/GordonB11, author = {David G. Gordon and Travis D. Breaux}, title = {Comparing requirements from multiple jurisdictions}, booktitle = {Fourth International Workshop on Requirements Engineering and Law, {RELAW} 2011, Trento, Italy, August 30, 2011}, pages = {43--49}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/RELAW.2011.6050272}, doi = {10.1109/RELAW.2011.6050272}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/GordonB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/Breaux10, author = {Travis D. Breaux}, title = {A method to acquire compliance monitors from regulations}, booktitle = {Third International Workshop on Requirements Engineering and Law, {RELAW} 2010, Sydney, NSW, Australia, September 28, 2010}, pages = {17--26}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/RELAW.2010.5625358}, doi = {10.1109/RELAW.2010.5625358}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/Breaux10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BreauxAS09, author = {Travis D. Breaux and Annie I. Ant{\'{o}}n and Eugene H. Spafford}, title = {A distributed requirements management framework for legal compliance and accountability}, journal = {Comput. Secur.}, volume = {28}, number = {1-2}, pages = {8--17}, year = {2009}, url = {https://doi.org/10.1016/j.cose.2008.08.001}, doi = {10.1016/J.COSE.2008.08.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BreauxAS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/BreauxABD09, author = {Travis D. Breaux and Annie I. Ant{\'{o}}n and Kent Boucher and Merlin Dorfman}, title = {{IT} Compliance: Aligning Legal and Product Requirements}, journal = {{IT} Prof.}, volume = {11}, number = {5}, pages = {54--58}, year = {2009}, url = {https://doi.org/10.1109/MITP.2009.101}, doi = {10.1109/MITP.2009.101}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/BreauxABD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/BreauxP09, author = {Travis D. Breaux and Calvin Powers}, editor = {Shahram Latifi}, title = {Early Studies in Acquiring Evidentiary, Reusable Business Process Models for Legal Compliance}, booktitle = {Sixth International Conference on Information Technology: New Generations, {ITNG} 2009, Las Vegas, Nevada, USA, 27-29 April 2009}, pages = {272--277}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ITNG.2009.72}, doi = {10.1109/ITNG.2009.72}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/BreauxP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/Breaux09, author = {Travis D. Breaux}, title = {Exercising Due Diligence in Legal Requirements Acquisition: {A} Tool-supported, Frame-Based Approach}, booktitle = {{RE} 2009, 17th {IEEE} International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31 - September 4, 2009}, pages = {225--230}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/RE.2009.46}, doi = {10.1109/RE.2009.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/Breaux09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BreauxLOA09, author = {Travis D. Breaux and Jonathan D. Lewis and Paul N. Otto and Annie I. Ant{\'{o}}n}, editor = {Sung Y. Shin and Sascha Ossowski}, title = {Identifying vulnerabilities and critical requirements using criminal court proceedings}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009}, pages = {355--359}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1529282.1529360}, doi = {10.1145/1529282.1529360}, timestamp = {Tue, 06 Nov 2018 11:06:49 +0100}, biburl = {https://dblp.org/rec/conf/sac/BreauxLOA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/BreauxAD08, author = {Travis D. Breaux and Annie I. Ant{\'{o}}n and Jon Doyle}, title = {Semantic parameterization: {A} process for modeling domain descriptions}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {18}, number = {2}, pages = {5:1--5:27}, year = {2008}, url = {https://doi.org/10.1145/1416563.1416565}, doi = {10.1145/1416563.1416565}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosem/BreauxAD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/BreauxA08, author = {Travis D. Breaux and Annie I. Ant{\'{o}}n}, title = {Analyzing Regulatory Rules for Privacy and Security Requirements}, journal = {{IEEE} Trans. Software Eng.}, volume = {34}, number = {1}, pages = {5--20}, year = {2008}, url = {https://doi.org/10.1109/TSE.2007.70746}, doi = {10.1109/TSE.2007.70746}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/BreauxA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/er/KiyavitskayaZBACMM08, author = {Nadzeya Kiyavitskaya and Nicola Zeni and Travis D. Breaux and Annie I. Ant{\'{o}}n and James R. Cordy and Luisa Mich and John Mylopoulos}, editor = {Qing Li and Stefano Spaccapietra and Eric S. K. Yu and Antoni Oliv{\'{e}}}, title = {Automating the Extraction of Rights and Obligations for Regulatory Compliance}, booktitle = {Conceptual Modeling - {ER} 2008, 27th International Conference on Conceptual Modeling, Barcelona, Spain, October 20-24, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5231}, pages = {154--168}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87877-3\_13}, doi = {10.1007/978-3-540-87877-3\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/er/KiyavitskayaZBACMM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/BreauxABD08, author = {Travis D. Breaux and Annie I. Ant{\'{o}}n and Kent Boucher and Merlin Dorfman}, title = {Legal Requirements, Compliance and Practice: An Industry Case Study in Accessibility}, booktitle = {16th {IEEE} International Requirements Engineering Conference, {RE} 2008, 8-12 September 2008, Barcelona, Catalunya, Spain}, pages = {43--52}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/RE.2008.36}, doi = {10.1109/RE.2008.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/BreauxABD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/KiyavitskayaZBACMM07, author = {Nadzeya Kiyavitskaya and Nicola Zeni and Travis D. Breaux and Annie I. Ant{\'{o}}n and James R. Cordy and Luisa Mich and John Mylopoulos}, editor = {R. E. Kurt Stirewalt and Alexander Egyed and Bernd Fischer}, title = {Extracting rights and obligations from regulations: toward a tool-supported process}, booktitle = {22nd {IEEE/ACM} International Conference on Automated Software Engineering {(ASE} 2007), November 5-9, 2007, Atlanta, Georgia, {USA}}, pages = {429--432}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1321631.1321701}, doi = {10.1145/1321631.1321701}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/KiyavitskayaZBACMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/BreauxAKK06, author = {Travis D. Breaux and Annie I. Ant{\'{o}}n and Clare{-}Marie Karat and John Karat}, title = {Enforceability vs. Accountability in Electronic Policies}, booktitle = {7th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2006), 5-7 June 2006, London, Ontario, Canada}, pages = {227--230}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/POLICY.2006.18}, doi = {10.1109/POLICY.2006.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/BreauxAKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/BreauxVA06, author = {Travis D. Breaux and Matthew W. Vail and Annie I. Ant{\'{o}}n}, title = {Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations}, booktitle = {14th {IEEE} International Conference on Requirements Engineering {(RE} 2006), 11-15 September 2006, Minneapolis/St.Paul, Minnesota, {USA}}, pages = {46--55}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/RE.2006.68}, doi = {10.1109/RE.2006.68}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/BreauxVA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/BreauxR05, author = {Travis D. Breaux and Joel W. Reed}, title = {Using Ontology in Hierarchical Information Clustering}, booktitle = {38th Hawaii International Conference on System Sciences {(HICSS-38} 2005), {CD-ROM} / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, {USA}}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/HICSS.2005.664}, doi = {10.1109/HICSS.2005.664}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/BreauxR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/BreauxA05, author = {Travis D. Breaux and Annie I. Ant{\'{o}}n}, title = {Deriving Semantic Models from Privacy Policies}, booktitle = {6th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2005), 6-8 June 2005, Stockholm, Sweden}, pages = {67--76}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/POLICY.2005.12}, doi = {10.1109/POLICY.2005.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/BreauxA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/BreauxA05, author = {Travis D. Breaux and Annie I. Ant{\'{o}}n}, title = {Analyzing Goal Semantics for Rights, Permissions, and Obligations}, booktitle = {13th {IEEE} International Conference on Requirements Engineering {(RE} 2005), 29 August - 2 September 2005, Paris, France}, pages = {177--188}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/RE.2005.12}, doi = {10.1109/RE.2005.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/BreauxA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/BreauxA05, author = {Travis D. Breaux and Annie I. Ant{\'{o}}n}, editor = {Vijay Atluri and Sabrina De Capitani di Vimercati and Roger Dingledine}, title = {Mining rule semantics to understand legislative compliance}, booktitle = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005}, pages = {51--54}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102199.1102210}, doi = {10.1145/1102199.1102210}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/BreauxA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.