Login / Signup
ESPRE
2015
2015
2015
Keyphrases
Publications
2015
Marco Antonio Torrez Rojas
,
Nelson Mimura Gonzalez
,
Fernando Sbampato
,
Fernando F. Redígolo
,
Tereza Cristina Melo de Brito Carvalho
,
Kim Khoa Nguyen
,
Mohamed Cheriet
Inclusion of security requirements in SLA lifecycle management for cloud computing.
ESPRE
(2015)
Christian Schmitt
,
Peter Liggesmeyer
Instantiating a model for structuring and reusing security requirements sources.
ESPRE
(2015)
Nedaa Zirjawi
,
Zijad Kurtanovic
,
Walid Maalej
A survey about user requirements for biometric authentication on smartphones.
ESPRE
(2015)
2nd IEEE Workshop on Evolving Security and Privacy Requirements Engineering, ESPRE 2015, Ottawa, ON, Canada, August 25, 2015
ESPRE
(2015)
Shaun Shei
,
Luis Márquez Alcañiz
,
Haralambos Mouratidis
,
Aidan J. Delaney
,
David G. Rosado
,
Eduardo Fernández-Medina
Modelling secure cloud systems based on system requirements.
ESPRE
(2015)
Eduardo B. Fernández
,
Nobukazu Yoshioka
,
Hironori Washizaki
Patterns for security and privacy in cloud ecosystems.
ESPRE
(2015)
2014
Dan Ionita
,
Jan-Willem Bullee
,
Roel J. Wieringa
Argumentation-based security requirements elicitation: The next round.
ESPRE
(2014)
Yod Samuel Martín
,
José M. del Álamo
,
Juan C. Yelmo
Engineering privacy requirements valuable lessons from another realm.
ESPRE
(2014)
Azadeh Alebrahim
,
Denis Hatebur
,
Ludger Goeke
Pattern-based and ISO 27001 compliant risk analysis for cloud systems.
ESPRE
(2014)
Hanan Hibshi
,
Travis D. Breaux
,
Maria Riaz
,
Laurie A. Williams
Towards a framework to measure security expertise in requirements analysis.
ESPRE
(2014)
Aaron Alva
,
Lisa Young
L-SQUARE: Preliminary extension of the SQUARE methodology to address legal compliance.
ESPRE
(2014)
Naney R. Mead
,
Jose Andre Morales
Using malware analysis to improve security requirements on future systems.
ESPRE
(2014)
IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering, ESPRE 2014, 25 August, 2014, Karlskrona, Sweden
ESPRE
(2014)
Tom-Michael Hesse
,
Stefan Gärtner
,
Tobias Roehm
,
Barbara Paech
,
Kurt Schneider
,
Bernd Bruegge
Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoring.
ESPRE
(2014)
Wolfgang Raschke
,
Massimiliano Zilli
,
Philip Baumgartner
,
Johannes Loinig
,
Christian Steger
,
Christian Kreiner
Supporting evolving security models for an agile security evaluation.
ESPRE
(2014)