Search dblp for Publications

export results for "toc:db/conf/re/espre2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/re/AlebrahimHG14,
  author       = {Azadeh Alebrahim and
                  Denis Hatebur and
                  Ludger Goeke},
  title        = {Pattern-based and {ISO} 27001 compliant risk analysis for cloud systems},
  booktitle    = {{ESPRE}},
  pages        = {42--47},
  year         = {2014},
  url          = {https://doi.org/10.1109/ESPRE.2014.6890527},
  doi          = {10.1109/ESPRE.2014.6890527},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/AlebrahimHG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/AlvaY14,
  author       = {Aaron Alva and
                  Lisa Young},
  title        = {{L-SQUARE:} Preliminary extension of the {SQUARE} methodology to address
                  legal compliance},
  booktitle    = {{ESPRE}},
  pages        = {25--30},
  year         = {2014},
  url          = {https://doi.org/10.1109/ESPRE.2014.6890524},
  doi          = {10.1109/ESPRE.2014.6890524},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/AlvaY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/HesseGRPSB14,
  author       = {Tom{-}Michael Hesse and
                  Stefan G{\"{a}}rtner and
                  Tobias Roehm and
                  Barbara Paech and
                  Kurt Schneider and
                  Bernd Bruegge},
  title        = {Semiautomatic security requirements engineering and evolution using
                  decision documentation, heuristics, and user monitoring},
  booktitle    = {{ESPRE}},
  pages        = {1--6},
  year         = {2014},
  url          = {https://doi.org/10.1109/ESPRE.2014.6890520},
  doi          = {10.1109/ESPRE.2014.6890520},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/HesseGRPSB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/HibshiBRW14,
  author       = {Hanan Hibshi and
                  Travis D. Breaux and
                  Maria Riaz and
                  Laurie A. Williams},
  title        = {Towards a framework to measure security expertise in requirements
                  analysis},
  booktitle    = {{ESPRE}},
  pages        = {13--18},
  year         = {2014},
  url          = {https://doi.org/10.1109/ESPRE.2014.6890522},
  doi          = {10.1109/ESPRE.2014.6890522},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/HibshiBRW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/IonitaBW14,
  author       = {Dan Ionita and
                  Jan{-}Willem Bullee and
                  Roel J. Wieringa},
  title        = {Argumentation-based security requirements elicitation: The next round},
  booktitle    = {{ESPRE}},
  pages        = {7--12},
  year         = {2014},
  url          = {https://doi.org/10.1109/ESPRE.2014.6890521},
  doi          = {10.1109/ESPRE.2014.6890521},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/IonitaBW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/MartinAY14,
  author       = {Yod Samuel Mart{\'{\i}}n and
                  Jos{\'{e}} M. del {\'{A}}lamo and
                  Juan C. Yelmo},
  title        = {Engineering privacy requirements valuable lessons from another realm},
  booktitle    = {{ESPRE}},
  pages        = {19--24},
  year         = {2014},
  url          = {https://doi.org/10.1109/ESPRE.2014.6890523},
  doi          = {10.1109/ESPRE.2014.6890523},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/MartinAY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/MeadM14,
  author       = {Naney R. Mead and
                  Jose Andre Morales},
  title        = {Using malware analysis to improve security requirements on future
                  systems},
  booktitle    = {{ESPRE}},
  pages        = {37--41},
  year         = {2014},
  url          = {https://doi.org/10.1109/ESPRE.2014.6890526},
  doi          = {10.1109/ESPRE.2014.6890526},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/MeadM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/RaschkeZBLSK14,
  author       = {Wolfgang Raschke and
                  Massimiliano Zilli and
                  Philip Baumgartner and
                  Johannes Loinig and
                  Christian Steger and
                  Christian Kreiner},
  title        = {Supporting evolving security models for an agile security evaluation},
  booktitle    = {{ESPRE}},
  pages        = {31--36},
  year         = {2014},
  url          = {https://doi.org/10.1109/ESPRE.2014.6890525},
  doi          = {10.1109/ESPRE.2014.6890525},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/RaschkeZBLSK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/re/2014espre,
  editor       = {Kristian Beckers and
                  Shamal Faily and
                  Seok{-}Won Lee and
                  Nancy R. Mead},
  title        = {{IEEE} 1st Workshop on Evolving Security and Privacy Requirements
                  Engineering, {ESPRE} 2014, 25 August, 2014, Karlskrona, Sweden},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6883269/proceeding},
  isbn         = {978-1-4799-6340-9},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/re/2014espre.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics