BibTeX records: Travis D. Breaux

download as .bib file

@article{DBLP:journals/tse/ShenB24,
  author       = {Yuchen Shen and
                  Travis D. Breaux},
  title        = {Stakeholder Preference Extraction From Scenarios},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {50},
  number       = {1},
  pages        = {69--84},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSE.2023.3333265},
  doi          = {10.1109/TSE.2023.3333265},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tse/ShenB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/RobolBPG23,
  author       = {Marco Robol and
                  Travis D. Breaux and
                  Elda Paja and
                  Paolo Giorgini},
  title        = {Consent Verification Monitoring},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {32},
  number       = {1},
  pages        = {2:1--2:33},
  year         = {2023},
  url          = {https://doi.org/10.1145/3490754},
  doi          = {10.1145/3490754},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/RobolBPG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/ZhangHSNBW23,
  author       = {Xueling Zhang and
                  John Heaps and
                  Rocky Slavin and
                  Jianwei Niu and
                  Travis D. Breaux and
                  Xiaoyin Wang},
  title        = {{DAISY:} Dynamic-Analysis-Induced Source Discovery for Sensitive Data},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {32},
  number       = {4},
  pages        = {89:1--89:34},
  year         = {2023},
  url          = {https://doi.org/10.1145/3569936},
  doi          = {10.1145/3569936},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/ZhangHSNBW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/BreauxM23,
  author       = {Travis D. Breaux and
                  Jennifer Moritz},
  title        = {A Metric for Measuring Software Engineering Post-Graduate Outcomes},
  booktitle    = {45th {IEEE/ACM} International Conference on Software Engineering:
                  Software Engineering Education and Training, SEET@ICSE 2023, Melbourne,
                  Australia, May 14-20, 2023},
  pages        = {283--295},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICSE-SEET58685.2023.00032},
  doi          = {10.1109/ICSE-SEET58685.2023.00032},
  timestamp    = {Thu, 20 Jul 2023 08:23:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/BreauxM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/HuangKHB23,
  author       = {Tianjian Huang and
                  Vaishnavi Kaulagi and
                  Mitra Bokaei Hosseini and
                  Travis D. Breaux},
  editor       = {Kurt Schneider and
                  Fabiano Dalpiaz and
                  Jennifer Horkoff},
  title        = {Mobile Application Privacy Risk Assessments from User-authored Scenarios},
  booktitle    = {31st {IEEE} International Requirements Engineering Conference, {RE}
                  2023, Hannover, Germany, September 4-8, 2023},
  pages        = {17--28},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/RE57278.2023.00012},
  doi          = {10.1109/RE57278.2023.00012},
  timestamp    = {Fri, 06 Oct 2023 16:02:57 +0200},
  biburl       = {https://dblp.org/rec/conf/re/HuangKHB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HibshiJB22,
  author       = {Hanan Hibshi and
                  Stephanie T. Jones and
                  Travis D. Breaux},
  title        = {A Systemic Approach for Natural Language Scenario Elicitation of Security
                  Requirements},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {6},
  pages        = {3579--3591},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3103109},
  doi          = {10.1109/TDSC.2021.3103109},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/HibshiJB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/BreauxN22,
  author       = {Travis D. Breaux and
                  Thomas B. Norton},
  title        = {Legal Accountability as Software Quality: {A} {U.S.} Data Processing
                  Perspective},
  booktitle    = {30th {IEEE} International Requirements Engineering Conference, {RE}
                  2022, Melbourne, Australia, August 15-19, 2022},
  pages        = {101--113},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/RE54965.2022.00016},
  doi          = {10.1109/RE54965.2022.00016},
  timestamp    = {Wed, 26 Oct 2022 19:40:33 +0200},
  biburl       = {https://dblp.org/rec/conf/re/BreauxN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/ShenB22,
  author       = {Yuchen Shen and
                  Travis D. Breaux},
  title        = {Domain Model Extraction from User-authored Scenarios and Word Embeddings},
  booktitle    = {30th {IEEE} International Requirements Engineering Conference Workshops,
                  {RE} 2022 - Workshops, Melbourne, Australia, August 15-19, 2022},
  pages        = {143--151},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/REW56159.2022.00036},
  doi          = {10.1109/REW56159.2022.00036},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/re/ShenB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-06406,
  author       = {Marco Robol and
                  Travis D. Breaux and
                  Elda Paja and
                  Paolo Giorgini},
  title        = {Consent verification monitoring},
  journal      = {CoRR},
  volume       = {abs/2206.06406},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.06406},
  doi          = {10.48550/ARXIV.2206.06406},
  eprinttype    = {arXiv},
  eprint       = {2206.06406},
  timestamp    = {Tue, 21 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-06406.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BreauxM21,
  author       = {Travis D. Breaux and
                  Jennifer Moritz},
  title        = {The 2021 software developer shortage is coming},
  journal      = {Commun. {ACM}},
  volume       = {64},
  number       = {7},
  pages        = {39--41},
  year         = {2021},
  url          = {https://doi.org/10.1145/3440753},
  doi          = {10.1145/3440753},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/BreauxM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/HosseiniBSNW21,
  author       = {Mitra Bokaei Hosseini and
                  Travis D. Breaux and
                  Rocky Slavin and
                  Jianwei Niu and
                  Xiaoyin Wang},
  title        = {Analyzing privacy policies through syntax-driven semantic analysis
                  of information types},
  journal      = {Inf. Softw. Technol.},
  volume       = {138},
  pages        = {106608},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.infsof.2021.106608},
  doi          = {10.1016/J.INFSOF.2021.106608},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/HosseiniBSNW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/HosseiniHS0B21,
  author       = {Mitra Bokaei Hosseini and
                  John Heaps and
                  Rocky Slavin and
                  Jianwei Niu and
                  Travis D. Breaux},
  title        = {Ambiguity and Generality in Natural Language Privacy Policies},
  booktitle    = {29th {IEEE} International Requirements Engineering Conference, {RE}
                  2021, Notre Dame, IN, USA, September 20-24, 2021},
  pages        = {70--81},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/RE51729.2021.00014},
  doi          = {10.1109/RE51729.2021.00014},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/re/HosseiniHS0B21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/refsq/2021w,
  editor       = {Fatma Basak Aydemir and
                  Catarina Gralha and
                  Maya Daneva and
                  Eduard C. Groen and
                  Andrea Herrmann and
                  Patrick Mennig and
                  Sallam Abualhaija and
                  Alessio Ferrari and
                  Jin Guo and
                  Renata S. S. Guizzardi and
                  Jennifer Horkoff and
                  Anna Perini and
                  Angelo Susi and
                  Travis D. Breaux and
                  Xavier Franch and
                  Neil A. Ernst and
                  Elda Paja and
                  Norbert Seyff},
  title        = {Joint Proceedings of {REFSQ} 2021 Workshops, OpenRE, Poster and Tools
                  Track, and Doctoral Symposium co-located with the 27th International
                  Conference on Requirements Engineering: Foundation for Software Quality
                  {(REFSQ} 2021), Essen, Germany, April 12, 2021},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2857},
  publisher    = {CEUR-WS.org},
  year         = {2021},
  url          = {https://ceur-ws.org/Vol-2857},
  urn          = {urn:nbn:de:0074-2857-1},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/refsq/2021w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/ZhangWSBN20,
  author       = {Xueling Zhang and
                  Xiaoyin Wang and
                  Rocky Slavin and
                  Travis D. Breaux and
                  Jianwei Niu},
  editor       = {Gregg Rothermel and
                  Doo{-}Hwan Bae},
  title        = {How does misconfiguration of analytic services compromise mobile privacy?},
  booktitle    = {{ICSE} '20: 42nd International Conference on Software Engineering,
                  Seoul, South Korea, 27 June - 19 July, 2020},
  pages        = {1572--1583},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377811.3380401},
  doi          = {10.1145/3377811.3380401},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/ZhangWSBN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/refsq/HosseiniSBW020,
  author       = {Mitra Bokaei Hosseini and
                  Rocky Slavin and
                  Travis D. Breaux and
                  Xiaoyin Wang and
                  Jianwei Niu},
  editor       = {Nazim H. Madhavji and
                  Liliana Pasquale and
                  Alessio Ferrari and
                  Stefania Gnesi},
  title        = {Disambiguating Requirements Through Syntax-Driven Semantic Analysis
                  of Information Types},
  booktitle    = {Requirements Engineering: Foundation for Software Quality - 26th International
                  Working Conference, {REFSQ} 2020, Pisa, Italy, March 24-27, 2020,
                  Proceedings {[REFSQ} 2020 was postponed]},
  series       = {Lecture Notes in Computer Science},
  volume       = {12045},
  pages        = {97--115},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-44429-7\_7},
  doi          = {10.1007/978-3-030-44429-7\_7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/refsq/HosseiniSBW020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/re/2020,
  editor       = {Travis D. Breaux and
                  Andrea Zisman and
                  Samuel Fricker and
                  Martin Glinz},
  title        = {28th {IEEE} International Requirements Engineering Conference, {RE}
                  2020, Zurich, Switzerland, August 31 - September 4, 2020},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/9211511/proceeding},
  isbn         = {978-1-7281-7438-9},
  timestamp    = {Wed, 14 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/re/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/CaramujoSMRCB19,
  author       = {Jo{\~{a}}o Caramujo and
                  Alberto Rodrigues da Silva and
                  Shaghayegh Monfared and
                  Andr{\'{e}} Ribeiro and
                  P{\'{a}}vel Calado and
                  Travis D. Breaux},
  title        = {RSL-IL4Privacy: a domain-specific language for the rigorous specification
                  of privacy policies},
  journal      = {Requir. Eng.},
  volume       = {24},
  number       = {1},
  pages        = {1--26},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00766-018-0305-2},
  doi          = {10.1007/S00766-018-0305-2},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/CaramujoSMRCB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/BhatiaEB19,
  author       = {Jaspreet Bhatia and
                  Morgan C. Evans and
                  Travis D. Breaux},
  title        = {Identifying incompleteness in privacy policy goals using semantic
                  frames},
  journal      = {Requir. Eng.},
  volume       = {24},
  number       = {3},
  pages        = {291--313},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00766-019-00315-y},
  doi          = {10.1007/S00766-019-00315-Y},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/BhatiaEB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/QinNGWB019,
  author       = {Xue Qin and
                  Robert Neuhaus and
                  Diego Gonzales and
                  Xiaoyin Wang and
                  Travis D. Breaux and
                  Jianwei Niu},
  editor       = {Xenofon D. Koutsoukos and
                  Alvaro A. C{\'{a}}rdenas and
                  Ehab Al{-}Shaer},
  title        = {Taming web views in the detection of Android privacy leaks},
  booktitle    = {Proceedings of the 6th Annual Symposium on Hot Topics in the Science
                  of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019},
  pages        = {23:1--23:2},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3314058.3317732},
  doi          = {10.1145/3314058.3317732},
  timestamp    = {Sat, 22 Jun 2019 19:13:09 +0200},
  biburl       = {https://dblp.org/rec/conf/hotsos/QinNGWB019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/HeapsZWB019,
  author       = {John Heaps and
                  Xueling Zhang and
                  Xiaoyin Wang and
                  Travis D. Breaux and
                  Jianwei Niu},
  editor       = {Xenofon D. Koutsoukos and
                  Alvaro A. C{\'{a}}rdenas and
                  Ehab Al{-}Shaer},
  title        = {Toward a reliability measurement framework automated using deep learning},
  booktitle    = {Proceedings of the 6th Annual Symposium on Hot Topics in the Science
                  of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019},
  pages        = {25:1--25:2},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3314058.3317733},
  doi          = {10.1145/3314058.3317733},
  timestamp    = {Sat, 22 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hotsos/HeapsZWB019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/RobolBPG19,
  author       = {Marco Robol and
                  Travis D. Breaux and
                  Elda Paja and
                  Paolo Giorgini},
  editor       = {Daniela E. Damian and
                  Anna Perini and
                  Seok{-}Won Lee},
  title        = {Consent Verification Under Evolving Privacy Policies},
  booktitle    = {27th {IEEE} International Requirements Engineering Conference, {RE}
                  2019, Jeju Island, Korea (South), September 23-27, 2019},
  pages        = {422--427},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/RE.2019.00056},
  doi          = {10.1109/RE.2019.00056},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/re/RobolBPG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/HeapsWB019,
  author       = {John Heaps and
                  Xiaoyin Wang and
                  Travis D. Breaux and
                  Jianwei Niu},
  editor       = {Florian Kerschbaum and
                  Atefeh Mashatan and
                  Jianwei Niu and
                  Adam J. Lee},
  title        = {Toward Detection of Access Control Models from Source Code via Word
                  Embedding},
  booktitle    = {Proceedings of the 24th {ACM} Symposium on Access Control Models and
                  Technologies, {SACMAT} 2019, Toronto, ON, Canada, June 03-06, 2019},
  pages        = {103--112},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3322431.3326329},
  doi          = {10.1145/3322431.3326329},
  timestamp    = {Sun, 02 Jun 2019 13:58:07 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/HeapsWB019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tochi/BhatiaB18,
  author       = {Jaspreet Bhatia and
                  Travis D. Breaux},
  title        = {Empirical Measurement of Perceived Privacy Risk},
  journal      = {{ACM} Trans. Comput. Hum. Interact.},
  volume       = {25},
  number       = {6},
  pages        = {34:1--34:47},
  year         = {2018},
  url          = {https://doi.org/10.1145/3267808},
  doi          = {10.1145/3267808},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tochi/BhatiaB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/WangQHSB018,
  author       = {Xiaoyin Wang and
                  Xue Qin and
                  Mitra Bokaei Hosseini and
                  Rocky Slavin and
                  Travis D. Breaux and
                  Jianwei Niu},
  editor       = {Michel Chaudron and
                  Ivica Crnkovic and
                  Marsha Chechik and
                  Mark Harman},
  title        = {GUILeak: tracing privacy policy claims on user input data for Android
                  applications},
  booktitle    = {Proceedings of the 40th International Conference on Software Engineering,
                  {ICSE} 2018, Gothenburg, Sweden, May 27 - June 03, 2018},
  pages        = {37--47},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3180155.3180196},
  doi          = {10.1145/3180155.3180196},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/WangQHSB018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/BhatiaB18,
  author       = {Jaspreet Bhatia and
                  Travis D. Breaux},
  editor       = {Guenther Ruhe and
                  Walid Maalej and
                  Daniel Amyot},
  title        = {Semantic Incompleteness in Privacy Policy Goals},
  booktitle    = {26th {IEEE} International Requirements Engineering Conference, {RE}
                  2018, Banff, AB, Canada, August 20-24, 2018},
  pages        = {159--169},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/RE.2018.00025},
  doi          = {10.1109/RE.2018.00025},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/BhatiaB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/refsq/HosseiniB018,
  author       = {Mitra Bokaei Hosseini and
                  Travis D. Breaux and
                  Jianwei Niu},
  editor       = {Erik Kamsties and
                  Jennifer Horkoff and
                  Fabiano Dalpiaz},
  title        = {Inferring Ontology Fragments from Semantic Role Typing of Lexical
                  Variants},
  booktitle    = {Requirements Engineering: Foundation for Software Quality - 24th International
                  Working Conference, {REFSQ} 2018, Utrecht, The Netherlands, March
                  19-22, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10753},
  pages        = {39--56},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-77243-1\_3},
  doi          = {10.1007/978-3-319-77243-1\_3},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/refsq/HosseiniB018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/HibshiB17,
  author       = {Hanan Hibshi and
                  Travis D. Breaux},
  editor       = {Ana Moreira and
                  Jo{\~{a}}o Ara{\'{u}}jo and
                  Jane Hayes and
                  Barbara Paech},
  title        = {Reinforcing Security Requirements with Multifactor Quality Measurement},
  booktitle    = {25th {IEEE} International Requirements Engineering Conference, {RE}
                  2017, Lisbon, Portugal, September 4-8, 2017},
  pages        = {144--153},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/RE.2017.77},
  doi          = {10.1109/RE.2017.77},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/HibshiB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/EvansBWB17,
  author       = {Morgan C. Evans and
                  Jaspreet Bhatia and
                  Sudarshan Wadkar and
                  Travis D. Breaux},
  editor       = {Ana Moreira and
                  Jo{\~{a}}o Ara{\'{u}}jo and
                  Jane Hayes and
                  Barbara Paech},
  title        = {An Evaluation of Constituency-Based Hyponymy Extraction from Privacy
                  Policies},
  booktitle    = {25th {IEEE} International Requirements Engineering Conference, {RE}
                  2017, Lisbon, Portugal, September 4-8, 2017},
  pages        = {312--321},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/RE.2017.87},
  doi          = {10.1109/RE.2017.87},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/EvansBWB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/BhatiaB17,
  author       = {Jaspreet Bhatia and
                  Travis D. Breaux},
  editor       = {Ana Moreira and
                  Jo{\~{a}}o Ara{\'{u}}jo and
                  Jane Hayes and
                  Barbara Paech},
  title        = {A Data Purpose Case Study of Privacy Policies},
  booktitle    = {25th {IEEE} International Requirements Engineering Conference, {RE}
                  2017, Lisbon, Portugal, September 4-8, 2017},
  pages        = {394--399},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/RE.2017.56},
  doi          = {10.1109/RE.2017.56},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/BhatiaB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/HibshiBRW16,
  author       = {Hanan Hibshi and
                  Travis D. Breaux and
                  Maria Riaz and
                  Laurie A. Williams},
  title        = {A grounded analysis of experts' decision-making during security assessments},
  journal      = {J. Cybersecur.},
  volume       = {2},
  number       = {2},
  pages        = {147--163},
  year         = {2016},
  url          = {https://doi.org/10.1093/cybsec/tyw010},
  doi          = {10.1093/CYBSEC/TYW010},
  timestamp    = {Mon, 07 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/HibshiBRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/SchaubBS16,
  author       = {Florian Schaub and
                  Travis D. Breaux and
                  Norman M. Sadeh},
  title        = {Crowdsourcing privacy policy analysis: Potential, challenges and best
                  practices},
  journal      = {it Inf. Technol.},
  volume       = {58},
  number       = {5},
  pages        = {229--236},
  year         = {2016},
  url          = {https://doi.org/10.1515/itit-2016-0009},
  doi          = {10.1515/ITIT-2016-0009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/it/SchaubBS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/BhatiaBS16,
  author       = {Jaspreet Bhatia and
                  Travis D. Breaux and
                  Florian Schaub},
  title        = {Mining Privacy Goals from Privacy Policies Using Hybridized Task Recomposition},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {25},
  number       = {3},
  pages        = {22:1--22:24},
  year         = {2016},
  url          = {https://doi.org/10.1145/2907942},
  doi          = {10.1145/2907942},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/BhatiaBS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaaifs/HosseiniWB016,
  author       = {Mitra Bokaei Hosseini and
                  Sudarshan Wadkar and
                  Travis D. Breaux and
                  Jianwei Niu},
  title        = {Lexical Similarity of Information Type Hypernyms, Meronyms and Synonyms
                  in Privacy Policies},
  booktitle    = {2016 {AAAI} Fall Symposia, Arlington, Virginia, USA, November 17-19,
                  2016},
  publisher    = {{AAAI} Press},
  year         = {2016},
  url          = {http://aaai.org/ocs/index.php/FSS/FSS16/paper/view/14139},
  timestamp    = {Wed, 14 Nov 2018 14:49:10 +0100},
  biburl       = {https://dblp.org/rec/conf/aaaifs/HosseiniWB016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BhatiaBFHS16,
  author       = {Jaspreet Bhatia and
                  Travis D. Breaux and
                  Liora Friedberg and
                  Hanan Hibshi and
                  Daniel Smullen},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  Erik{-}Oliver Blass and
                  Florian Kerschbaum},
  title        = {Privacy Risk in Cybersecurity Data Sharing},
  booktitle    = {Proceedings of the 2016 {ACM} on Workshop on Information Sharing and
                  Collaborative Security, {WISCS} 2016, Vienna, Austria, October 24
                  - 28, 2016},
  pages        = {57--64},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2994541},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BhatiaBFHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/SmullenB16,
  author       = {Daniel Smullen and
                  Travis D. Breaux},
  editor       = {William L. Scherlis and
                  David Brumley},
  title        = {Modeling, analyzing, and consistency checking privacy requirements
                  using eddy},
  booktitle    = {Proceedings of the Symposium and Bootcamp on the Science of Security,
                  Pittsburgh, PA, USA, April 19-21, 2016},
  pages        = {118--120},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2898375.2898381},
  doi          = {10.1145/2898375.2898381},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotsos/SmullenB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/SilvaCMCB16,
  author       = {Alberto Rodrigues da Silva and
                  Jo{\~{a}}o Caramujo and
                  Shaghayegh Monfared and
                  P{\'{a}}vel Calado and
                  Travis D. Breaux},
  editor       = {Slimane Hammoudi and
                  Leszek A. Maciaszek and
                  Michele Missikoff and
                  Olivier Camp and
                  Jos{\'{e}} Cordeiro},
  title        = {Improving the Specification and Analysis of Privacy Policies - The
                  RSLingo4Privacy Approach},
  booktitle    = {{ICEIS} 2016 - Proceedings of the 18th International Conference on
                  Enterprise Information Systems, Volume 1, Rome, Italy, April 25-28,
                  2016},
  pages        = {336--347},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005870503360347},
  doi          = {10.5220/0005870503360347},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iceis/SilvaCMCB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/SlavinWHHKBBN16,
  author       = {Rocky Slavin and
                  Xiaoyin Wang and
                  Mitra Bokaei Hosseini and
                  James Hester and
                  Ram Krishnan and
                  Jaspreet Bhatia and
                  Travis D. Breaux and
                  Jianwei Niu},
  editor       = {Laura K. Dillon and
                  Willem Visser and
                  Laurie A. Williams},
  title        = {Toward a framework for detecting privacy policy violations in android
                  application code},
  booktitle    = {Proceedings of the 38th International Conference on Software Engineering,
                  {ICSE} 2016, Austin, TX, USA, May 14-22, 2016},
  pages        = {25--36},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2884781.2884855},
  doi          = {10.1145/2884781.2884855},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/SlavinWHHKBBN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/SlavinWHHKBBN16a,
  author       = {Rocky Slavin and
                  Xiaoyin Wang and
                  Mitra Bokaei Hosseini and
                  James Hester and
                  Ram Krishnan and
                  Jaspreet Bhatia and
                  Travis D. Breaux and
                  Jianwei Niu},
  title        = {PVDetector: a detector of privacy-policy violations for Android apps},
  booktitle    = {Proceedings of the International Conference on Mobile Software Engineering
                  and Systems, MOBILESoft '16, Austin, Texas, USA, May 14-22, 2016},
  pages        = {299--300},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897073.2897720},
  doi          = {10.1145/2897073.2897720},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/SlavinWHHKBBN16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/BhatiaEWB16,
  author       = {Jaspreet Bhatia and
                  Morgan C. Evans and
                  Sudarshan Wadkar and
                  Travis D. Breaux},
  title        = {Automated Extraction of Regulated Information Types Using Hyponymy
                  Relations},
  booktitle    = {24th {IEEE} International Requirements Engineering Conference, {RE}
                  2016, Beijing, China, September 12-16, 2016},
  pages        = {19--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/REW.2016.018},
  doi          = {10.1109/REW.2016.018},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/BhatiaEWB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/BhatiaBRN16,
  author       = {Jaspreet Bhatia and
                  Travis D. Breaux and
                  Joel R. Reidenberg and
                  Thomas B. Norton},
  title        = {A Theory of Vagueness and Privacy Risk Perception},
  booktitle    = {24th {IEEE} International Requirements Engineering Conference, {RE}
                  2016, Beijing, China, September 12-16, 2016},
  pages        = {26--35},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/RE.2016.20},
  doi          = {10.1109/RE.2016.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/BhatiaBRN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssci/HibshiBW16,
  author       = {Hanan Hibshi and
                  Travis D. Breaux and
                  Christian Wagner},
  title        = {Improving security requirements adequacy},
  booktitle    = {2016 {IEEE} Symposium Series on Computational Intelligence, {SSCI}
                  2016, Athens, Greece, December 6-9, 2016},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/SSCI.2016.7849906},
  doi          = {10.1109/SSCI.2016.7849906},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssci/HibshiBW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/RiazBW15,
  author       = {Maria Riaz and
                  Travis D. Breaux and
                  Laurie A. Williams},
  title        = {How have we evaluated software pattern application? {A} systematic
                  mapping study of research design practices},
  journal      = {Inf. Softw. Technol.},
  volume       = {65},
  pages        = {14--38},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.infsof.2015.04.002},
  doi          = {10.1016/J.INFSOF.2015.04.002},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/infsof/RiazBW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/BhatiaB15,
  author       = {Jaspreet Bhatia and
                  Travis D. Breaux},
  title        = {Towards an information type lexicon for privacy policies},
  booktitle    = {Eighth {IEEE} International Workshop on Requirements Engineering and
                  Law, {RELAW} 2015, Ottawa, ON, Canada, August 25, 2015},
  pages        = {19--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/RELAW.2015.7330207},
  doi          = {10.1109/RELAW.2015.7330207},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/BhatiaB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/GhanavatiB15,
  author       = {Sepideh Ghanavati and
                  Travis D. Breaux},
  title        = {Comparing and analyzing definitions in multi-jurisdictions},
  booktitle    = {Eighth {IEEE} International Workshop on Requirements Engineering and
                  Law, {RELAW} 2015, Ottawa, ON, Canada, August 25, 2015},
  pages        = {47--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/RELAW.2015.7330211},
  doi          = {10.1109/RELAW.2015.7330211},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/re/GhanavatiB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/HibshiBB15,
  author       = {Hanan Hibshi and
                  Travis D. Breaux and
                  Stephen B. Broomell},
  editor       = {Didar Zowghi and
                  Vincenzo Gervasi and
                  Daniel Amyot},
  title        = {Assessment of risk perception in security requirements composition},
  booktitle    = {23rd {IEEE} International Requirements Engineering Conference, {RE}
                  2015, Ottawa, ON, Canada, August 24-28, 2015},
  pages        = {146--155},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/RE.2015.7320417},
  doi          = {10.1109/RE.2015.7320417},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/HibshiBB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/BreauxSH15,
  author       = {Travis D. Breaux and
                  Daniel Smullen and
                  Hanan Hibshi},
  editor       = {Didar Zowghi and
                  Vincenzo Gervasi and
                  Daniel Amyot},
  title        = {Detecting repurposing and over-collection in multi-party privacy requirements
                  specifications},
  booktitle    = {23rd {IEEE} International Requirements Engineering Conference, {RE}
                  2015, Ottawa, ON, Canada, August 24-28, 2015},
  pages        = {166--175},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/RE.2015.7320419},
  doi          = {10.1109/RE.2015.7320419},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/BreauxSH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/BreauxHR14,
  author       = {Travis D. Breaux and
                  Hanan Hibshi and
                  Ashwini Rao},
  title        = {Eddy, a formal language for specifying and analyzing data flow specifications
                  for conflicting privacy requirements},
  journal      = {Requir. Eng.},
  volume       = {19},
  number       = {3},
  pages        = {281--307},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00766-013-0190-7},
  doi          = {10.1007/S00766-013-0190-7},
  timestamp    = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/BreauxHR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/software/Breaux14,
  author       = {Travis D. Breaux},
  title        = {Privacy Requirements in an Age of Increased Sharing},
  journal      = {{IEEE} Softw.},
  volume       = {31},
  number       = {5},
  pages        = {24--27},
  year         = {2014},
  url          = {https://doi.org/10.1109/MS.2014.118},
  doi          = {10.1109/MS.2014.118},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/software/Breaux14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hcomp/SchaubBS14,
  author       = {Florian Schaub and
                  Travis D. Breaux and
                  Norman M. Sadeh},
  editor       = {Jeffrey P. Bigham and
                  David C. Parkes},
  title        = {Crowdsourcing the Extraction of Data Practices from Privacy Policies},
  booktitle    = {Proceedings of the Seconf {AAAI} Conference on Human Computation and
                  Crowdsourcing, {HCOMP} 2014, November 2-4, 2014, Pittsburgh, Pennsylvania,
                  {USA}},
  pages        = {56--57},
  publisher    = {{AAAI}},
  year         = {2014},
  url          = {https://doi.org/10.1609/hcomp.v2i1.13190},
  doi          = {10.1609/HCOMP.V2I1.13190},
  timestamp    = {Tue, 05 Sep 2023 11:10:11 +0200},
  biburl       = {https://dblp.org/rec/conf/hcomp/SchaubBS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/RaoHBLN14,
  author       = {Ashwini Rao and
                  Hanan Hibshi and
                  Travis D. Breaux and
                  Jean{-}Michel Lehker and
                  Jianwei Niu},
  editor       = {Laurie A. Williams and
                  David M. Nicol and
                  Munindar P. Singh},
  title        = {Less is more?: investigating the role of examples in security studies
                  using analogical transfer},
  booktitle    = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security,
                  HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014},
  pages        = {7},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600176.2600182},
  doi          = {10.1145/2600176.2600182},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotsos/RaoHBLN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/HibshiBRW14,
  author       = {Hanan Hibshi and
                  Travis D. Breaux and
                  Maria Riaz and
                  Laurie A. Williams},
  editor       = {Kristian Beckers and
                  Shamal Faily and
                  Seok{-}Won Lee and
                  Nancy R. Mead},
  title        = {Towards a framework to measure security expertise in requirements
                  analysis},
  booktitle    = {{IEEE} 1st Workshop on Evolving Security and Privacy Requirements
                  Engineering, {ESPRE} 2014, 25 August, 2014, Karlskrona, Sweden},
  pages        = {13--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ESPRE.2014.6890522},
  doi          = {10.1109/ESPRE.2014.6890522},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/HibshiBRW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/BreauxS14,
  author       = {Travis D. Breaux and
                  Florian Schaub},
  editor       = {Tony Gorschek and
                  Robyn R. Lutz},
  title        = {Scaling requirements extraction to the crowd: Experiments with privacy
                  policies},
  booktitle    = {{IEEE} 22nd International Requirements Engineering Conference, {RE}
                  2014, Karlskrona, Sweden, August 25-29, 2014},
  pages        = {163--172},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/RE.2014.6912258},
  doi          = {10.1109/RE.2014.6912258},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/BreauxS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/SlavinLNB14,
  author       = {Rocky Slavin and
                  Jean{-}Michel Lehker and
                  Jianwei Niu and
                  Travis D. Breaux},
  editor       = {Tony Gorschek and
                  Robyn R. Lutz},
  title        = {Managing security requirements patterns using feature diagram hierarchies},
  booktitle    = {{IEEE} 22nd International Requirements Engineering Conference, {RE}
                  2014, Karlskrona, Sweden, August 25-29, 2014},
  pages        = {193--202},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/RE.2014.6912261},
  doi          = {10.1109/RE.2014.6912261},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/re/SlavinLNB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/GordonB14,
  author       = {David G. Gordon and
                  Travis D. Breaux},
  editor       = {Tony Gorschek and
                  Robyn R. Lutz},
  title        = {The role of legal expertise in interpretation of legal requirements
                  and definitions},
  booktitle    = {{IEEE} 22nd International Requirements Engineering Conference, {RE}
                  2014, Karlskrona, Sweden, August 25-29, 2014},
  pages        = {273--282},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/RE.2014.6912269},
  doi          = {10.1109/RE.2014.6912269},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/GordonB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/re/2014relaw,
  editor       = {Daniel Amyot and
                  Annie I. Ant{\'{o}}n and
                  Travis D. Breaux and
                  Aaron K. Massey and
                  Alberto Siena},
  title        = {{IEEE} 7th International Workshop on Requirements Engineering and
                  Law, {RELAW} 2014, 26-26 August, 2014, Karlskrona, Sweden},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6887459/proceeding},
  isbn         = {978-1-4799-6325-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/re/2014relaw.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BreauxG13,
  author       = {Travis D. Breaux and
                  David G. Gordon},
  title        = {What Engineers Should Know about {US} Security and Privacy Law},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {11},
  number       = {3},
  pages        = {72--76},
  year         = {2013},
  url          = {https://doi.org/10.1109/MSP.2013.74},
  doi          = {10.1109/MSP.2013.74},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BreauxG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/GordonB13,
  author       = {David G. Gordon and
                  Travis D. Breaux},
  title        = {A cross-domain empirical study and legal evaluation of the requirements
                  water marking method},
  journal      = {Requir. Eng.},
  volume       = {18},
  number       = {2},
  pages        = {147--173},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00766-013-0167-6},
  doi          = {10.1007/S00766-013-0167-6},
  timestamp    = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/GordonB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/BreauxGPP13,
  author       = {Travis D. Breaux and
                  David G. Gordon and
                  Nick Papanikolaou and
                  Siani Pearson},
  editor       = {Daniel Amyot and
                  Annie I. Ant{\'{o}}n and
                  Travis D. Breaux and
                  Aaron K. Massey and
                  Peter P. Swire},
  title        = {Mapping legal requirements to {IT} controls},
  booktitle    = {Sixth International Workshop on Requirements Engineering and Law,
                  {RELAW} 2013, 16 July, 2013, Rio de Janeiro, Brasil},
  pages        = {11--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/RELAW.2013.6671341},
  doi          = {10.1109/RELAW.2013.6671341},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/BreauxGPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/BreauxR13,
  author       = {Travis D. Breaux and
                  Ashwini Rao},
  title        = {Formal analysis of privacy requirements specifications for multi-tier
                  applications},
  booktitle    = {21st {IEEE} International Requirements Engineering Conference, {RE}
                  2013, Rio de Janeiro-RJ, Brazil, July 15-19, 2013},
  pages        = {14--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/RE.2013.6636701},
  doi          = {10.1109/RE.2013.6636701},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/BreauxR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/JuretaBSG13,
  author       = {Ivan Jureta and
                  Travis D. Breaux and
                  Alberto Siena and
                  David G. Gordon},
  editor       = {Daniel Amyot and
                  Annie I. Ant{\'{o}}n and
                  Travis D. Breaux and
                  Aaron K. Massey and
                  Peter P. Swire},
  title        = {Toward benchmarks to assess advancement in legal requirements modeling},
  booktitle    = {Sixth International Workshop on Requirements Engineering and Law,
                  {RELAW} 2013, 16 July, 2013, Rio de Janeiro, Brasil},
  pages        = {25--33},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/RELAW.2013.6671343},
  doi          = {10.1109/RELAW.2013.6671343},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/JuretaBSG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/BreauxG13,
  author       = {Travis D. Breaux and
                  David G. Gordon},
  editor       = {Daniel Amyot and
                  Annie I. Ant{\'{o}}n and
                  Travis D. Breaux and
                  Aaron K. Massey and
                  Peter P. Swire},
  title        = {Preserving traceability and encoding meaning in legal requirements
                  extraction},
  booktitle    = {Sixth International Workshop on Requirements Engineering and Law,
                  {RELAW} 2013, 16 July, 2013, Rio de Janeiro, Brasil},
  pages        = {57--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/RELAW.2013.6671347},
  doi          = {10.1109/RELAW.2013.6671347},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/BreauxG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/GordonB13,
  author       = {David G. Gordon and
                  Travis D. Breaux},
  title        = {Assessing regulatory change through legal requirements coverage modeling},
  booktitle    = {21st {IEEE} International Requirements Engineering Conference, {RE}
                  2013, Rio de Janeiro-RJ, Brazil, July 15-19, 2013},
  pages        = {145--154},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/RE.2013.6636714},
  doi          = {10.1109/RE.2013.6636714},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/GordonB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/refsq/BreauxG13,
  author       = {Travis D. Breaux and
                  David G. Gordon},
  editor       = {J{\"{o}}rg D{\"{o}}rr and
                  Andreas L. Opdahl},
  title        = {Regulatory Requirements Traceability and Analysis Using Semi-formal
                  Specifications},
  booktitle    = {Requirements Engineering: Foundation for Software Quality - 19th International
                  Working Conference, {REFSQ} 2013, Essen, Germany, April 8-11, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7830},
  pages        = {141--157},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-37422-7\_11},
  doi          = {10.1007/978-3-642-37422-7\_11},
  timestamp    = {Sat, 19 Oct 2019 20:28:57 +0200},
  biburl       = {https://dblp.org/rec/conf/refsq/BreauxG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/re/2013relaw,
  editor       = {Daniel Amyot and
                  Annie I. Ant{\'{o}}n and
                  Travis D. Breaux and
                  Aaron K. Massey and
                  Peter P. Swire},
  title        = {Sixth International Workshop on Requirements Engineering and Law,
                  {RELAW} 2013, 16 July, 2013, Rio de Janeiro, Brasil},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6656122/proceeding},
  isbn         = {978-1-4799-0950-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/re/2013relaw.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/BreauxHRL12,
  author       = {Travis D. Breaux and
                  Hanan Hibshi and
                  Ashwini Rao and
                  Jean{-}Michel Lehker},
  title        = {Towards a framework for pattern experimentation: Understanding empirical
                  validity in requirements engineering patterns},
  booktitle    = {Second {IEEE} International Workshop on Requirements Patterns, RePa
                  2012, Chicago, IL, USA, September 24, 2012},
  pages        = {41--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/RePa.2012.6359975},
  doi          = {10.1109/REPA.2012.6359975},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/BreauxHRL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/GordonB12,
  author       = {David G. Gordon and
                  Travis D. Breaux},
  editor       = {Mats Per Erik Heimdahl and
                  Pete Sawyer},
  title        = {Reconciling multi-jurisdictional legal requirements: {A} case study
                  in requirements water marking},
  booktitle    = {2012 20th {IEEE} International Requirements Engineering Conference
                  (RE), Chicago, IL, USA, September 24-28, 2012},
  pages        = {91--100},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/RE.2012.6345843},
  doi          = {10.1109/RE.2012.6345843},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/GordonB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BreauxB11,
  author       = {Travis D. Breaux and
                  David L. Baumer},
  title        = {Legally "reasonable" security requirements: {A} 10-year
                  {FTC} retrospective},
  journal      = {Comput. Secur.},
  volume       = {30},
  number       = {4},
  pages        = {178--193},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.cose.2010.11.003},
  doi          = {10.1016/J.COSE.2010.11.003},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/BreauxB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/AntonBGM11,
  author       = {Annie I. Ant{\'{o}}n and
                  Travis D. Breaux and
                  Stefanos Gritzalis and
                  John Mylopoulos},
  title        = {Digital privacy: theory, policies and technologies},
  journal      = {Requir. Eng.},
  volume       = {16},
  number       = {1},
  pages        = {1--2},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00766-011-0117-0},
  doi          = {10.1007/S00766-011-0117-0},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/AntonBGM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GordonB11,
  author       = {David G. Gordon and
                  Travis D. Breaux},
  editor       = {Christian Cachin and
                  Thomas Ristenpart},
  title        = {Managing multi-jurisdictional requirements in the cloud: towards a
                  computational legal landscape},
  booktitle    = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2011, Chicago, IL, USA, October 21, 2011},
  pages        = {83--94},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046660.2046678},
  doi          = {10.1145/2046660.2046678},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GordonB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/BreauxA11,
  author       = {Travis D. Breaux and
                  Thomas A. Alspaugh},
  title        = {Governance and accountability in the new data ecology},
  booktitle    = {Fourth International Workshop on Requirements Engineering and Law,
                  {RELAW} 2011, Trento, Italy, August 30, 2011},
  pages        = {5--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/RELAW.2011.6050267},
  doi          = {10.1109/RELAW.2011.6050267},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/BreauxA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/GordonB11,
  author       = {David G. Gordon and
                  Travis D. Breaux},
  title        = {Comparing requirements from multiple jurisdictions},
  booktitle    = {Fourth International Workshop on Requirements Engineering and Law,
                  {RELAW} 2011, Trento, Italy, August 30, 2011},
  pages        = {43--49},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/RELAW.2011.6050272},
  doi          = {10.1109/RELAW.2011.6050272},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/GordonB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/Breaux10,
  author       = {Travis D. Breaux},
  title        = {A method to acquire compliance monitors from regulations},
  booktitle    = {Third International Workshop on Requirements Engineering and Law,
                  {RELAW} 2010, Sydney, NSW, Australia, September 28, 2010},
  pages        = {17--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/RELAW.2010.5625358},
  doi          = {10.1109/RELAW.2010.5625358},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/Breaux10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BreauxAS09,
  author       = {Travis D. Breaux and
                  Annie I. Ant{\'{o}}n and
                  Eugene H. Spafford},
  title        = {A distributed requirements management framework for legal compliance
                  and accountability},
  journal      = {Comput. Secur.},
  volume       = {28},
  number       = {1-2},
  pages        = {8--17},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.cose.2008.08.001},
  doi          = {10.1016/J.COSE.2008.08.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BreauxAS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/BreauxABD09,
  author       = {Travis D. Breaux and
                  Annie I. Ant{\'{o}}n and
                  Kent Boucher and
                  Merlin Dorfman},
  title        = {{IT} Compliance: Aligning Legal and Product Requirements},
  journal      = {{IT} Prof.},
  volume       = {11},
  number       = {5},
  pages        = {54--58},
  year         = {2009},
  url          = {https://doi.org/10.1109/MITP.2009.101},
  doi          = {10.1109/MITP.2009.101},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/BreauxABD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/BreauxP09,
  author       = {Travis D. Breaux and
                  Calvin Powers},
  editor       = {Shahram Latifi},
  title        = {Early Studies in Acquiring Evidentiary, Reusable Business Process
                  Models for Legal Compliance},
  booktitle    = {Sixth International Conference on Information Technology: New Generations,
                  {ITNG} 2009, Las Vegas, Nevada, USA, 27-29 April 2009},
  pages        = {272--277},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ITNG.2009.72},
  doi          = {10.1109/ITNG.2009.72},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itng/BreauxP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/Breaux09,
  author       = {Travis D. Breaux},
  title        = {Exercising Due Diligence in Legal Requirements Acquisition: {A} Tool-supported,
                  Frame-Based Approach},
  booktitle    = {{RE} 2009, 17th {IEEE} International Requirements Engineering Conference,
                  Atlanta, Georgia, USA, August 31 - September 4, 2009},
  pages        = {225--230},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/RE.2009.46},
  doi          = {10.1109/RE.2009.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/Breaux09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BreauxLOA09,
  author       = {Travis D. Breaux and
                  Jonathan D. Lewis and
                  Paul N. Otto and
                  Annie I. Ant{\'{o}}n},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski},
  title        = {Identifying vulnerabilities and critical requirements using criminal
                  court proceedings},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Applied Computing (SAC),
                  Honolulu, Hawaii, USA, March 9-12, 2009},
  pages        = {355--359},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1529282.1529360},
  doi          = {10.1145/1529282.1529360},
  timestamp    = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/BreauxLOA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/BreauxAD08,
  author       = {Travis D. Breaux and
                  Annie I. Ant{\'{o}}n and
                  Jon Doyle},
  title        = {Semantic parameterization: {A} process for modeling domain descriptions},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {18},
  number       = {2},
  pages        = {5:1--5:27},
  year         = {2008},
  url          = {https://doi.org/10.1145/1416563.1416565},
  doi          = {10.1145/1416563.1416565},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosem/BreauxAD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/BreauxA08,
  author       = {Travis D. Breaux and
                  Annie I. Ant{\'{o}}n},
  title        = {Analyzing Regulatory Rules for Privacy and Security Requirements},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {34},
  number       = {1},
  pages        = {5--20},
  year         = {2008},
  url          = {https://doi.org/10.1109/TSE.2007.70746},
  doi          = {10.1109/TSE.2007.70746},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/BreauxA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/er/KiyavitskayaZBACMM08,
  author       = {Nadzeya Kiyavitskaya and
                  Nicola Zeni and
                  Travis D. Breaux and
                  Annie I. Ant{\'{o}}n and
                  James R. Cordy and
                  Luisa Mich and
                  John Mylopoulos},
  editor       = {Qing Li and
                  Stefano Spaccapietra and
                  Eric S. K. Yu and
                  Antoni Oliv{\'{e}}},
  title        = {Automating the Extraction of Rights and Obligations for Regulatory
                  Compliance},
  booktitle    = {Conceptual Modeling - {ER} 2008, 27th International Conference on
                  Conceptual Modeling, Barcelona, Spain, October 20-24, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5231},
  pages        = {154--168},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87877-3\_13},
  doi          = {10.1007/978-3-540-87877-3\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/er/KiyavitskayaZBACMM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/BreauxABD08,
  author       = {Travis D. Breaux and
                  Annie I. Ant{\'{o}}n and
                  Kent Boucher and
                  Merlin Dorfman},
  title        = {Legal Requirements, Compliance and Practice: An Industry Case Study
                  in Accessibility},
  booktitle    = {16th {IEEE} International Requirements Engineering Conference, {RE}
                  2008, 8-12 September 2008, Barcelona, Catalunya, Spain},
  pages        = {43--52},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/RE.2008.36},
  doi          = {10.1109/RE.2008.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/BreauxABD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/KiyavitskayaZBACMM07,
  author       = {Nadzeya Kiyavitskaya and
                  Nicola Zeni and
                  Travis D. Breaux and
                  Annie I. Ant{\'{o}}n and
                  James R. Cordy and
                  Luisa Mich and
                  John Mylopoulos},
  editor       = {R. E. Kurt Stirewalt and
                  Alexander Egyed and
                  Bernd Fischer},
  title        = {Extracting rights and obligations from regulations: toward a tool-supported
                  process},
  booktitle    = {22nd {IEEE/ACM} International Conference on Automated Software Engineering
                  {(ASE} 2007), November 5-9, 2007, Atlanta, Georgia, {USA}},
  pages        = {429--432},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1321631.1321701},
  doi          = {10.1145/1321631.1321701},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/KiyavitskayaZBACMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/BreauxAKK06,
  author       = {Travis D. Breaux and
                  Annie I. Ant{\'{o}}n and
                  Clare{-}Marie Karat and
                  John Karat},
  title        = {Enforceability vs. Accountability in Electronic Policies},
  booktitle    = {7th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2006), 5-7 June 2006, London, Ontario, Canada},
  pages        = {227--230},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/POLICY.2006.18},
  doi          = {10.1109/POLICY.2006.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/BreauxAKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/BreauxVA06,
  author       = {Travis D. Breaux and
                  Matthew W. Vail and
                  Annie I. Ant{\'{o}}n},
  title        = {Towards Regulatory Compliance: Extracting Rights and Obligations to
                  Align Requirements with Regulations},
  booktitle    = {14th {IEEE} International Conference on Requirements Engineering {(RE}
                  2006), 11-15 September 2006, Minneapolis/St.Paul, Minnesota, {USA}},
  pages        = {46--55},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/RE.2006.68},
  doi          = {10.1109/RE.2006.68},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/BreauxVA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/BreauxR05,
  author       = {Travis D. Breaux and
                  Joel W. Reed},
  title        = {Using Ontology in Hierarchical Information Clustering},
  booktitle    = {38th Hawaii International Conference on System Sciences {(HICSS-38}
                  2005), {CD-ROM} / Abstracts Proceedings, 3-6 January 2005, Big Island,
                  HI, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/HICSS.2005.664},
  doi          = {10.1109/HICSS.2005.664},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/BreauxR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/BreauxA05,
  author       = {Travis D. Breaux and
                  Annie I. Ant{\'{o}}n},
  title        = {Deriving Semantic Models from Privacy Policies},
  booktitle    = {6th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2005), 6-8 June 2005, Stockholm, Sweden},
  pages        = {67--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/POLICY.2005.12},
  doi          = {10.1109/POLICY.2005.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/BreauxA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/BreauxA05,
  author       = {Travis D. Breaux and
                  Annie I. Ant{\'{o}}n},
  title        = {Analyzing Goal Semantics for Rights, Permissions, and Obligations},
  booktitle    = {13th {IEEE} International Conference on Requirements Engineering {(RE}
                  2005), 29 August - 2 September 2005, Paris, France},
  pages        = {177--188},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/RE.2005.12},
  doi          = {10.1109/RE.2005.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/BreauxA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/BreauxA05,
  author       = {Travis D. Breaux and
                  Annie I. Ant{\'{o}}n},
  editor       = {Vijay Atluri and
                  Sabrina De Capitani di Vimercati and
                  Roger Dingledine},
  title        = {Mining rule semantics to understand legislative compliance},
  booktitle    = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005},
  pages        = {51--54},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102199.1102210},
  doi          = {10.1145/1102199.1102210},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/BreauxA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics