Default Cover Image

2014 IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)

Aug. 25 2014 to Aug. 25 2014

Karlskrona, Sweden

Table of Contents

ContentsFreely available from IEEE.pp. 1-1
Message from the chairsFreely available from IEEE.pp. iii-iv
Argumentation-based security requirements elicitation: The next roundFull-text access may be available. Sign in or learn about subscription options.pp. 7-12
Towards a framework to measure security expertise in requirements analysisFull-text access may be available. Sign in or learn about subscription options.pp. 13-18
Engineering privacy requirements valuable lessons from another realmFull-text access may be available. Sign in or learn about subscription options.pp. 19-24
L-SQUARE: Preliminary extension of the SQUARE methodology to address legal complianceFull-text access may be available. Sign in or learn about subscription options.pp. 25-30
Using malware analysis to improve security requirements on future systemsFull-text access may be available. Sign in or learn about subscription options.pp. 37-41
Pattern-based and ISO 27001 compliant risk analysis for cloud systemsFull-text access may be available. Sign in or learn about subscription options.pp. 42-47
Showing 10 out of 10