Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ESPRE
ESPRE 2014
Generate Citations
2014 IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)
Aug. 25 2014 to Aug. 25 2014
Karlskrona, Sweden
Table of Contents
Contents
Freely available from IEEE.
pp. 1-1
Message from the chairs
Freely available from IEEE.
pp. iii-iv
Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Tom-Michael Hesse
,
Stefan Gartner
,
Tobias Roehm
,
Barbara Paech
,
Kurt Schneider
,
Bernd Bruegge
Argumentation-based security requirements elicitation: The next round
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-12
by
Dan Ionita
,
Jan-Willem Bullee
,
Roel J. Wieringa
Towards a framework to measure security expertise in requirements analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-18
by
Hanan Hibshi
,
Travis Breaux
,
Maria Riaz
,
Laurie Williams
Engineering privacy requirements valuable lessons from another realm
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-24
by
Yod-Samuel Martin
,
Jose M. del Alamo
,
Juan C. Yelmo
L-SQUARE: Preliminary extension of the SQUARE methodology to address legal compliance
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-30
by
Aaron Alva
,
Lisa Young
Supporting evolving security models for an agile security evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-36
by
Wolfgang Raschke
,
Massimiliano Zilli
,
Philip Baumgartner
,
Johannes Loinig
,
Christian Steger
,
Christian Kreiner
Using malware analysis to improve security requirements on future systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-41
by
Naney R. Mead
,
Jose Andre Morales
Pattern-based and ISO 27001 compliant risk analysis for cloud systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-47
by
Azadeh Alebrahim
,
Denis Hatebur
,
Ludger Goeke
Showing 10 out of 10